메뉴 건너뛰기




Volumn 9, Issue 1, 2013, Pages 1-14

Chi-squared distance and metamorphic virus detection

Author keywords

[No Author keywords available]

Indexed keywords

ANTIVIRUS SOFTWARES; CHI-SQUARED; CHI-SQUARED TEST; DETECTION METHODS; EXPERIMENTAL EVIDENCE; HIDDEN MARKOV MODEL(HMM); HMM-BASED; INTERNAL STRUCTURE; MACHINE LEARNING METHODS; MALWARES; METAMORPHIC MALWARE; MORPHING; STATISTICAL TECHNIQUES; VIRUS DETECTION;

EID: 84874559655     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-012-0171-2     Document Type: Article
Times cited : (80)

References (30)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: an aid to bibliographic search
    • Aho, A. V., Corasick, M. J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18, 333-340 (1975).
    • (1975) Commun. ACM , vol.18 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 6
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211-220 (2008).
    • (2008) J. Comput. Virol. , vol.4 , Issue.3 , pp. 211-220
    • Borello, J.1    Me, L.2
  • 8
    • 84874567416 scopus 로고    scopus 로고
    • Cygwin September 2011, [online]. Available at
    • Cygwin September 2011, [online]. Available at http://www. cygwin. com (2011).
    • (2011)
  • 11
    • 34249862179 scopus 로고    scopus 로고
    • A statistical model for undecidable viral detection
    • Filiol, E., Josse, S.: A statistical model for undecidable viral detection. J. Comput. Virol. 3(1), 65-74 (2007).
    • (2007) J. Comput. Virol. , vol.3 , Issue.1 , pp. 65-74
    • Filiol, E.1    Josse, S.2
  • 13
    • 84874562079 scopus 로고    scopus 로고
    • [online]. Available at
    • IDAPro, Interactive dissassembler, 2011, [online]. Available at http://www. hex-rays. com/products/ida/index. shtml.
    • (2011) IDAPro, Interactive dissassembler
  • 14
    • 84874569082 scopus 로고    scopus 로고
    • Intel, Intel®Architecture Software Developer's Manual, October
    • Intel, Intel®Architecture Software Developer's Manual, vol. 2. Instruction Set Reference Manual, October (2011).
    • (2011) Instruction Set Reference Manual , vol.2
  • 15
    • 12244279567 scopus 로고    scopus 로고
    • Learning to detect malicious executables in the wild
    • Kolter, J., Maloof, M.: Learning to detect malicious executables in the wild. Proceedings of KDD '04 (2004).
    • (2004) Proceedings of KDD '04
    • Kolter, J.1    Maloof, M.2
  • 16
    • 79960582590 scopus 로고    scopus 로고
    • Hunting for undetectable metamorphic viruses
    • Lin, D., Stamp, M.: Hunting for undetectable metamorphic viruses. J. Comput. Virol. 7(3), 201-214 (2011).
    • (2011) J. Comput. Virol. , vol.7 , Issue.3 , pp. 201-214
    • Lin, D.1    Stamp, M.2
  • 24
    • 14344254800 scopus 로고    scopus 로고
    • Hunting for metamorphic
    • Ször P., Ferrie P.: Hunting for metamorphic. Virus Bull. 123-144 (2001).
    • (2001) Virus Bull , pp. 123-144
    • Ször, P.1    Ferrie, P.2
  • 27
    • 84874563014 scopus 로고    scopus 로고
    • [online]. Available at
    • Vx heavens, [online]. Available at http://www. vx. netlux. org/.
    • Vx heavens
  • 29
    • 33751210025 scopus 로고    scopus 로고
    • Department of Computer Science, San Jose State University, May, Master's Thesis
    • Wong, W.: Analysis and detection of metamorphic computer viruses. Department of Computer Science, San Jose State University, May, Master's Thesis (2006).
    • (2006) Analysis and detection of metamorphic computer viruses
    • Wong, W.1
  • 30
    • 33751208937 scopus 로고    scopus 로고
    • Hunting for metamorphic engines
    • Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211-229 (2006).
    • (2006) J. Comput. Virol. , vol.2 , Issue.3 , pp. 211-229
    • Wong, W.1    Stamp, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.