메뉴 건너뛰기




Volumn 7795 LNCS, Issue , 2013, Pages 416-431

LTL model-checking for malware detection

Author keywords

[No Author keywords available]

Indexed keywords

BINARY PROGRAMS; CTL MODEL-CHECKING; EMPTINESS PROBLEM; LTL MODEL-CHECKING; MALICIOUS BEHAVIOR; MALWARE DETECTION; MALWARES; MODEL CHECKING PROBLEM; OUT-OF-MEMORY; PUSHDOWN SYSTEMS; ROBUST TECHNIQUE; SECURITY THREATS;

EID: 84874443181     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36742-7_29     Document Type: Conference Paper
Times cited : (20)

References (22)
  • 1
    • 79960360109 scopus 로고    scopus 로고
    • Malware Analysis with Tree Automata Inference
    • Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. Springer, Heidelberg
    • Babić, D., Reynaud, D., Song, D.: Malware Analysis with Tree Automata Inference. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 116-131. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6806 , pp. 116-131
    • Babić, D.1    Reynaud, D.2    Song, D.3
  • 2
    • 78650082281 scopus 로고    scopus 로고
    • Behavior Abstraction in Malware Analysis
    • Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Roşu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. Springer, Heidelberg
    • Beaucamps, P., Gnaedig, I., Marion, J.-Y.: Behavior Abstraction in Malware Analysis. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Roşu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 168-182. Springer, Heidelberg(2010)
    • (2010) LNCS , vol.6418 , pp. 168-182
    • Beaucamps, P.1    Gnaedig, I.2    Marion, J.-Y.3
  • 3
    • 84865600110 scopus 로고    scopus 로고
    • Abstraction-Based Malware Analysis Using Rewriting and Model Checking
    • Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
    • Beaucamps, P., Gnaedig, I., Marion, J.-Y.: Abstraction-Based Malware Analysis Using Rewriting and Model Checking. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 806-823. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7459 , pp. 806-823
    • Beaucamps, P.1    Gnaedig, I.2    Marion, J.-Y.3
  • 6
    • 84944409047 scopus 로고    scopus 로고
    • Reachability analysis of pushdown automata: Application to model-checking
    • Concur '97: Concurrency Theory
    • Bouajjani, A., Esparza, J., Maler, O.: Reachability Analysis of Pushdown Automata: Application to Model-Checking. In: Mazurkiewicz, A., Winkowski, J. (eds.) CONCUR 1997. LNCS, vol. 1243, pp. 135-150. Springer, Heidelberg (1997) (Pubitemid 127089315)
    • (1997) LECTURE NOTES in COMPUTER SCIENCE , Issue.1243 , pp. 135-150
    • Bouajjani, A.1    Esparza, J.2    Maler, O.3
  • 9
    • 0142121527 scopus 로고    scopus 로고
    • Model checking LTL with regular valuations for pushdown systems
    • Esparza, J., Kucera, A., Schwoon, S.: Model checking LTL with regular valuations for pushdown systems. Inf. Comput. 186(2) (2003)
    • (2003) Inf. Comput. , vol.186 , Issue.2
    • Esparza, J.1    Kucera, A.2    Schwoon, S.3
  • 10
    • 84958757867 scopus 로고    scopus 로고
    • A BDD-Based Model Checker for Recursive Programs
    • Computer Aided Verification
    • Esparza, J., Schwoon, S.: A BDD-Based Model Checker for Recursive Programs. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 324-336. Springer, Heidelberg (2001) (Pubitemid 33312928)
    • (2001) LECTURE NOTES in COMPUTER SCIENCE , Issue.2102 , pp. 324-336
    • Esparza, J.1    Schwoon, S.2
  • 11
    • 77953773956 scopus 로고    scopus 로고
    • Variable Automata over Infinite Alphabets
    • Dediu, A.-H., Fernau, H.,Martín-Vide, C. (eds.) LATA 2010. Springer, Heidelberg
    • Grumberg, O., Kupferman, O., Sheinvald, S.: Variable Automata over Infinite Alphabets. In: Dediu, A.-H., Fernau, H.,Martín-Vide, C. (eds.) LATA 2010. LNCS, vol. 6031, pp. 561-572. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6031 , pp. 561-572
    • Grumberg, O.1    Kupferman, O.2    Sheinvald, S.3
  • 12
    • 84937399243 scopus 로고    scopus 로고
    • Monodic Fragments of First-Order Temporal Logics: 2000-2001 A.D
    • Logic for Programming, Artificial Intelligence, and Reasoning
    • Hodkinson, I., Wolter, F., Zakharyaschev, M.: Monodic Fragments of First-Order Temporal Logics: 2000-2001 A.D. In: Nieuwenhuis, R., Voronkov, A. (eds.) LPAR 2001. LNCS (LNAI), vol. 2250, pp. 1-23. Springer, Heidelberg (2001) (Pubitemid 33373239)
    • (2001) LECTURE NOTES in COMPUTER SCIENCE , Issue.2250 , pp. 1-23
    • Hodkinson, I.1    Wolter, F.2    Zakharyaschev, M.3
  • 13
    • 26444526878 scopus 로고    scopus 로고
    • Detecting malicious code by model checking
    • Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
    • Kinder, J., Katzenbeisser, S., Schallhart, C., Veith, H.: Detecting Malicious Code by Model Checking. In: Julisch, K., Kruegel, C. (eds.) DIMVA 2005. LNCS, vol. 3548, pp. 174-187. Springer, Heidelberg (2005) (Pubitemid 41423155)
    • (2005) Lecture Notes in Computer Science , vol.3548 , pp. 174-187
    • Kinder, J.1    Katzenbeisser, S.2    Schallhart, C.3    Veith, H.4
  • 14
    • 77955020949 scopus 로고    scopus 로고
    • An Automata-Theoretic Approach to Infinite-State Systems
    • Manna, Z., Peled, D.A. (eds.) Time for Verification. Springer, Heidelberg
    • Kupferman, O., Piterman, N., Vardi, M.Y.: An Automata-Theoretic Approach to Infinite-State Systems. In: Manna, Z., Peled, D.A. (eds.) Time for Verification. LNCS, vol. 6200, pp. 202-259. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6200 , pp. 202-259
    • Kupferman, O.1    Piterman, N.2    Vardi, M.Y.3
  • 15
    • 84859363174 scopus 로고    scopus 로고
    • Context-sensitive analysis of obfuscated x86 executables
    • Lakhotia, A., Boccardo, D.R., Singh, A., Manacero, A.: Context-sensitive analysis of obfuscated x86 executables. In: PEPM (2010)
    • (2010) PEPM
    • Lakhotia, A.1    Boccardo, D.R.2    Singh, A.3    Manacero, A.4
  • 16
    • 33751120104 scopus 로고    scopus 로고
    • A method for detecting obfuscated calls in malicious binaries
    • Lakhotia, A., Kumar, E.U., Venable, M.: A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng. 31(11) (2005)
    • (2005) IEEE Trans. Software Eng. , vol.31 , Issue.11
    • Lakhotia, A.1    Kumar, E.U.2    Venable, M.3
  • 17
    • 84946414079 scopus 로고    scopus 로고
    • Static verification of worm and virus behavior in binary executables using model checking
    • Singh, P.K., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: IAW (2003)
    • (2003) IAW
    • Singh, P.K.1    Lakhotia, A.2
  • 18
    • 0022326404 scopus 로고
    • The complementation problem for büchi automata with appplications to temporal logic
    • Sistla, A.P., Vardi, M.Y., Wolper, P.: The complementation problem for büchi automata with appplications to temporal logic. Theor. Comput. Sci. 49, 217-237 (1987)
    • (1987) Theor. Comput. Sci. , vol.49 , pp. 217-237
    • Sistla, A.P.1    Vardi, M.Y.2    Wolper, P.3
  • 19
    • 84865960635 scopus 로고    scopus 로고
    • Efficient Malware Detection Using Model-Checking
    • Giannakopoulou, D., Méry, D. (eds.) FM 2012. Springer, Heidelberg
    • Song, F., Touili, T.: Efficient Malware Detection Using Model-Checking. In: Giannakopoulou, D., Méry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 418-433. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7436 , pp. 418-433
    • Song, F.1    Touili, T.2
  • 20
    • 84859310292 scopus 로고    scopus 로고
    • Pushdown Model Checking for Malware Detection
    • Flanagan, C., König, B. (eds.) TACAS 2012. Springer, Heidelberg
    • Song, F., Touili, T.: Pushdown Model Checking for Malware Detection. In: Flanagan, C., König, B. (eds.) TACAS 2012. LNCS, vol. 7214, pp. 110-125. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7214 , pp. 110-125
    • Song, F.1    Touili, T.2
  • 22
    • 84863919267 scopus 로고    scopus 로고
    • Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs
    • Computer Aided Verification
    • Xu, Y., Cerny, E., Song, X., Corella, F., Mohamed, O.A.: Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs. In: Vardi, M.Y. (ed.) CAV 1998. LNCS, vol. 1427, pp. 219-231. Springer, Heidelberg (1998) (Pubitemid 128092341)
    • (1998) LECTURE NOTES in COMPUTER SCIENCE , Issue.1427 , pp. 219-231
    • Xu, Y.1    Cerny, E.2    Song, X.3    Cotella, F.4    Ait, M.O.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.