메뉴 건너뛰기




Volumn 107, Issue , 2010, Pages 61-70

Classification of malware using structured control flow

Author keywords

Malware; Network security; Structured control flow; Unpacking

Indexed keywords

APPLICATION LEVEL; COMPLETE SYSTEM; CONTROL FLOW GRAPHS; CONTROL FLOWS; DECOMPILATION; EDIT DISTANCE; EXECUTION TIME; MALWARES; NETWORK SYSTEMS; NOVEL ALGORITHM; STRUCTURED GRAPHS; UNPACKING;

EID: 84869003423     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (89)

References (30)
  • 3
  • 4
    • 84869033248 scopus 로고    scopus 로고
    • Pandora's Bochs: Automatic Unpacking of Malware
    • Boehne, L. (2008): Pandora's Bochs: Automatic Unpacking of Malware. University of Mannheim.
    • (2008) University of Mannheim.
    • Boehne, L.1
  • 5
    • 77954325210 scopus 로고    scopus 로고
    • Graphs, Entropy and Grid Computing: Automatic Comparison of Malware
    • Briones, I. & Gomez, A. (2008): Graphs, Entropy and Grid Computing: Automatic Comparison of Malware. Virus Bulletin Conference, 1-12.
    • (2008) Virus Bulletin Conference , pp. 1-12
    • Briones, I.1    Gomez, A.2
  • 6
    • 54849432819 scopus 로고    scopus 로고
    • Digital genome mapping-advanced binary malware analysis
    • Carrera, E. & Erdélyi, G. (2004): Digital genome mapping-advanced binary malware analysis. Virus Bulletin Conference, 187-197.
    • (2004) Virus Bulletin Conference , pp. 187-197
    • Carrera, E.1    Erdélyi, G.2
  • 9
    • 77954316719 scopus 로고    scopus 로고
    • Graph-based comparison of Executable Objects (English Version)
    • Dullien, T. & Rolles, R. (2005): Graph-based comparison of Executable Objects (English Version). SSTIC.
    • (2005) SSTIC.
    • Dullien, T.1    Rolles, R.2
  • 10
    • 57049171932 scopus 로고    scopus 로고
    • Binhunt: Automatically finding semantic differences in binary programs
    • Gao, D., Reiter, M. K. & Song, D. (2008): Binhunt: Automatically finding semantic differences in binary programs. Information and Communications Security, 5308:238-255, Springer.
    • (2008) Information and Communications Security , vol.5308 , Issue.SPRINGER , pp. 238-255
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 11
    • 54849414050 scopus 로고    scopus 로고
    • An automated virus classification system
    • Gheorghescu, M. (2005): An automated virus classification system. Virus Bulletin Conference, 294-300.
    • (2005) Virus Bulletin Conference , pp. 294-300
    • Gheorghescu, M.1
  • 12
    • 70349122266 scopus 로고    scopus 로고
    • Generic unpacking: How to handle modified or unknown PE compression engines
    • Graf, T. (2005): Generic unpacking: How to handle modified or unknown PE compression engines. Virus Bulletin Conference.
    • (2005) Virus Bulletin Conference.
    • Graf, T.1
  • 18
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • Lyda, R. & Hamrock, J. (2007) Using entropy analysis to find encrypted and packed malware. IEEE Security and Privacy, 5 (2):40.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 40
    • Lyda, R.1    Hamrock, J.2
  • 21
    • 0035784361 scopus 로고    scopus 로고
    • New algorithms for control-flow graph structuring
    • Moretti, E., Chanteperdrix, G. & Osorio, A. (2001): New algorithms for control-flow graph structuring. Software Maintenance and Reengineering, 184. Mal(ware)formation statistics - Panda Research Blog: Panda Research, http://research.pandasecurity.com/archive/Mal_2800_ware_2900_formation-statistics.aspx. 19 August 2009.
    • (2001) Software Maintenance and Reengineering , pp. 184
    • Moretti, E.1    Chanteperdrix, G.2    Osorio, A.3
  • 22
    • 84869003041 scopus 로고    scopus 로고
    • Mal(ware)formation statistics - Panda Research Blog: Panda Research, 19 August
    • Mal(ware)formation statistics - Panda Research Blog: Panda Research, http://research.pandasecurity.com/archive/Mal_2800_ware_2900_formation-statistics.aspx. 19 August 2009.
    • (2009)
  • 23
    • 60649088451 scopus 로고    scopus 로고
    • McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables
    • IEEE Computer Society Washington, DC, USA.
    • Perdisci, R., Lanzi, A. & Lee, W. (2008): McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. Proceedings of the 2008 Annual Computer Security Applications Conference, 301-310, IEEE Computer Society Washington, DC, USA.
    • (2008) Proceedings of the 2008 Annual Computer Security Applications Conference , pp. 301-310
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 24
    • 77955171595 scopus 로고    scopus 로고
    • Covert Debugging Circumventing Software Armoring Techniques
    • Black Hat Briefings USA.
    • Quist, D. & Valsmith (2007): Covert Debugging Circumventing Software Armoring Techniques. Black Hat Briefings USA.
    • (2007)
    • Quist1    Valsmith, D.2
  • 26
    • 70449649114 scopus 로고    scopus 로고
    • Rotalume: A Tool for Automatic Reverse Engineering of Malware Emulators
    • INC., I. G.
    • Sharif, M., Lanzi, A., Giffin, J. & Lee, W. Rotalume: A Tool for Automatic Reverse Engineering of Malware Emulators. INC., I. G.
    • Sharif, M.1    Lanzi, A.2    Giffin, J.3    Lee, W.4
  • 27
    • 48649089436 scopus 로고    scopus 로고
    • Improving proactive detection of packed malware
    • Stepan, A. (2006): Improving proactive detection of packed malware. Virus Bulletin Conference, 1.
    • (2006) Virus Bulletin Conference, 1.
    • Stepan, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.