메뉴 건너뛰기




Volumn 7436 LNCS, Issue , 2012, Pages 418-433

Efficient malware detection using model-checking

Author keywords

[No Author keywords available]

Indexed keywords

MALICIOUS BEHAVIOR; MALWARE DETECTION; MALWARES; MEMORY LOCATIONS; PROGRAM MODELS; PUSHDOWN SYSTEMS; ROBUST TECHNIQUE;

EID: 84865960635     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32759-9_34     Document Type: Conference Paper
Times cited : (43)

References (25)
  • 1
    • 84865960220 scopus 로고    scopus 로고
    • Version 6.0.1367
    • Avast. Free avast antivirus, http://www.avast.com, Version 6.0.1367
    • Free Avast Antivirus
  • 2
    • 84865963365 scopus 로고    scopus 로고
    • Version 12.0.0.849
    • Avira, http://www.avira.com, Version 12.0.0.849
  • 3
    • 79960360109 scopus 로고    scopus 로고
    • Malware Analysis with Tree Automata Inference
    • Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. Springer, Heidelberg
    • Babić, D., Reynaud, D., Song, D.: Malware Analysis with Tree Automata Inference. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 116-131. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6806 , pp. 116-131
    • Babić, D.1    Reynaud, D.2    Song, D.3
  • 4
    • 26444538294 scopus 로고    scopus 로고
    • Model Checking x86 Executables with CodeSurfer/x86 and WPDS++
    • Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
    • Balakrishnan, G., Reps, T., Kidd, N., Lal, A., Lim, J.,Melski, D., Gruian, R., Yong, S., Chen, C.-H., Teitelbaum, T.:Model Checking x86 Executables with CodeSurfer/x86 and WPDS++. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 158-163. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3576 , pp. 158-163
    • Balakrishnan, G.1    Reps, T.2    Kidd, N.3    Lal, A.4    Lim, J.5    Melski, D.6    Gruian, R.7    Yong, S.8    Chen, C.-H.9    Teitelbaum, T.10
  • 7
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: 12th USENIX Security Symposium, pp. 169-186 (2003)
    • (2003) 12th USENIX Security Symposium , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 10
    • 84958757867 scopus 로고    scopus 로고
    • A BDD-Based Model Checker for Recursive Programs
    • Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. Springer, Heidelberg
    • Esparza, J., Schwoon, S.: A BDD-Based Model Checker for Recursive Programs. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 324-336. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2102 , pp. 324-336
    • Esparza, J.1    Schwoon, S.2
  • 14
    • 38449121202 scopus 로고    scopus 로고
    • Using Verification Technology to Specify and Detect Malware
    • Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. Springer, Heidelberg
    • Holzer, A., Kinder, J., Veith, H.: Using Verification Technology to Specify and Detect Malware. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds.) EUROCAST 2007. LNCS, vol. 4739, pp. 497-504. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4739 , pp. 497-504
    • Holzer, A.1    Kinder, J.2    Veith, H.3
  • 15
    • 84865980131 scopus 로고    scopus 로고
    • Version 12.0.0.374
    • Kaspersky, http://www.kaspersky.com, Version 12.0.0.374
    • Kaspersky
  • 16
    • 26444526878 scopus 로고    scopus 로고
    • Detecting Malicious Code by Model Checking
    • Julisch, K., Kruegel, C. (eds.) DIMVA 2005. Springer, Heidelberg
    • Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting Malicious Code by Model Checking. In: Julisch, K., Kruegel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3548 , pp. 174-187
    • Kinder, J.1    Katzenbeisser, S.2    Schallhart, C.3    Veith, H.4
  • 18
    • 48949099057 scopus 로고    scopus 로고
    • Jakstab: A Static Analysis Platform for Binaries
    • Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
    • Kinder, J., Veith, H.: Jakstab: A Static Analysis Platform for Binaries. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 423-427. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5123 , pp. 423-427
    • Kinder, J.1    Veith, H.2
  • 19
    • 84859363174 scopus 로고    scopus 로고
    • Context-sensitive analysis of obfuscated x86 executables
    • Lakhotia, A., Boccardo, D.R., Singh, A., Manacero, A.: Context-sensitive analysis of obfuscated x86 executables. In: PEPM (2010)
    • (2010) PEPM
    • Lakhotia, A.1    Boccardo, D.R.2    Singh, A.3    Manacero, A.4
  • 20
    • 33751120104 scopus 로고    scopus 로고
    • A method for detecting obfuscated calls in malicious binaries
    • Lakhotia, A., Kumar, E.U., Venable, M.: A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng. 31(11) (2005)
    • (2005) IEEE Trans. Software Eng. , vol.31 , Issue.11
    • Lakhotia, A.1    Kumar, E.U.2    Venable, M.3
  • 21
    • 84865973989 scopus 로고    scopus 로고
    • Qihoo 360, http://www.360.cn
    • Qihoo 360
  • 22
    • 84946414079 scopus 로고    scopus 로고
    • Static verification of worm and virus behavior in binary executables using model checking
    • Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: IAW, pp. 298-300 (2003)
    • (2003) IAW , pp. 298-300
    • Singh, P.K.1    Lakhotia, A.2
  • 24
    • 84859310292 scopus 로고    scopus 로고
    • Pushdown Model Checking for Malware Detection
    • Flanagan, C., König, B. (eds.) TACAS 2012. Springer, Heidelberg
    • Song, F., Touili, T.: Pushdown Model Checking for Malware Detection. In: Flanagan, C., König, B. (eds.) TACAS 2012. LNCS, vol. 7214, pp. 110-125. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7214 , pp. 110-125
    • Song, F.1    Touili, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.