메뉴 건너뛰기




Volumn , Issue , 2012, Pages 80-94

Abusing file processing in malware detectors for fun and profit

Author keywords

[No Author keywords available]

Indexed keywords

VIRUSES;

EID: 84876950829     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.15     Document Type: Conference Paper
Times cited : (66)

References (39)
  • 1
    • 84878352084 scopus 로고    scopus 로고
    • S. Alvarez. Antivirus insecurity. http://events.ccc.de/camp/2007/ Fahrplan/attachments/1324-AntivirusInSecuritySergioshadownAlvarez.pdf, 2007.
    • (2007) Antivirus Insecurity
    • Alvarez, S.1
  • 4
    • 70449629310 scopus 로고    scopus 로고
    • Secure content sniffing for web browsers, or how to stop papers from reviewing themselves
    • A. Barth, J. Caballero, and D. Song. Secure content sniffing for web browsers, or how to stop papers from reviewing themselves. In S&P, 2009.
    • (2009) S&P
    • Barth, A.1    Caballero, J.2    Song, D.3
  • 5
    • 77954612255 scopus 로고    scopus 로고
    • Regular expressions considered harmful in client-side XSS filters
    • D. Bates, A. Barth, and C. Jackson. Regular expressions considered harmful in client-side XSS filters. In WWW, 2010.
    • (2010) WWW
    • Bates, D.1    Barth, A.2    Jackson, C.3
  • 6
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In USENIX Security, 2007.
    • (2007) USENIX Security
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 7
    • 67650790221 scopus 로고    scopus 로고
    • KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008.
    • (2008) OSDI
    • Cadar, C.1    Dunbar, D.2    Engler, D.3
  • 8
    • 53349116756 scopus 로고    scopus 로고
    • Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
    • X. Chen, J. Andersen, Z. Mao, M. Bailey, and J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In DSN, 2008.
    • (2008) DSN
    • Chen, X.1    Andersen, J.2    Mao, Z.3    Bailey, M.4    Nazario, J.5
  • 10
    • 85175130093 scopus 로고    scopus 로고
    • http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=evasion, 2012.
    • (2012)
  • 12
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in system call interposition based security tools
    • T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In NDSS, 2003.
    • (2003) NDSS
    • Garfinkel, T.1
  • 13
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 18
    • 85175131551 scopus 로고    scopus 로고
    • McAfee VirusScan vulnerability. http://www.pc1news.com/news/0665/ mcafeevirusscanvulnerability-allow-compressed-archives-to-bypass-the-scan- engine.html, 2009.
    • (2009) McAfee VirusScan Vulnerability
  • 20
    • 85084161406 scopus 로고    scopus 로고
    • PolyPack: An automated online packing service for optimal antivirus evasion
    • J. Oberheide, M. Bailey, and F. Jahanian. PolyPack: An automated online packing service for optimal antivirus evasion. In WOOT, 2009.
    • (2009) WOOT
    • Oberheide, J.1    Bailey, M.2    Jahanian, F.3
  • 28
    • 84870818497 scopus 로고    scopus 로고
    • Quo vadis? A study of the evolution of input validation vulnerabilities in Web applications
    • T. Scholte, D. Balzarotti, and E. Kirda. Quo vadis? A study of the evolution of input validation vulnerabilities in Web applications. In FC, 2011.
    • (2011) FC
    • Scholte, T.1    Balzarotti, D.2    Kirda, E.3
  • 30
    • 85175132385 scopus 로고    scopus 로고
    • IE content-type logic. http://blogs.msdn.com/b/ie/archive/2005/02/01/ 364581.aspx, 2005.
    • (2005) IE Content-type Logic
  • 32
    • 84878358066 scopus 로고    scopus 로고
    • Virus Total. http://www.virustotal.com.
    • Virus Total
  • 34
    • 85084162296 scopus 로고    scopus 로고
    • Exploiting concurrency vulnerabilities in system call wrappers
    • R. Watson. Exploiting concurrency vulnerabilities in system call wrappers. In WOOT, 2007.
    • (2007) WOOT
    • Watson, R.1
  • 36
    • 85175131416 scopus 로고    scopus 로고
    • A. Wheeler and N. Mehta. 0wning antivirus. http://www.blackhat.com/ presentations/bh-europe-05/bh-eu-05-wheeler-mehta-up.pdf, 2005.
    • (2005) 0wning Antivirus
    • Wheeler, A.1    Mehta, N.2
  • 37
    • 84908489837 scopus 로고    scopus 로고
    • F. Xue. Attacking antivirus. http://www.blackhat.com/presentations/bh- europe-08/Feng-Xue/Whitepaper/bh-eu-08-xue-WP.pdf, 2008.
    • (2008) Attacking Antivirus
    • Xue, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.