메뉴 건너뛰기




Volumn , Issue , 2013, Pages 119-129

Looking at the bag is not enough to find the bomb: An evasion of structural methods for malicious PDF files detection

Author keywords

detection evasion; machine learning; pdf malware detection; reverse mimicry

Indexed keywords

LOGICAL STRUCTURE; MALICIOUS PDF; MALWARE DETECTION; PDF FILES; PROTECTION MECHANISMS; REAL SAMPLES; REVERSE MIMICRY; STRUCTURAL METHODS;

EID: 84877998967     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484327     Document Type: Conference Paper
Times cited : (122)

References (42)
  • 1
    • 84877955890 scopus 로고    scopus 로고
    • Contagio. http://contagiodump.blogspot.it.
  • 2
    • 84877933177 scopus 로고    scopus 로고
    • Malware tracker. http://www.malwaretracker.com/pdfthreat.php.
  • 4
    • 84877962192 scopus 로고    scopus 로고
    • Origami framework. Http://esec-lab.sogeti.com/pages/Origami.
    • Origami Framework
  • 5
    • 84877966499 scopus 로고    scopus 로고
    • Pdf tools. http://blog.didierstevens.com/programs/pdf-tools/.
    • Pdf Tools
  • 6
    • 84877970857 scopus 로고    scopus 로고
    • Pdfrate. http://pdfrate.com.
  • 7
    • 84877961773 scopus 로고    scopus 로고
    • Peepdf. Http://eternal-todo.com/tools/peepdf-pdf-analysis-tool.
    • Peepdf
  • 8
    • 84877975008 scopus 로고    scopus 로고
    • Pypdf. http://pybrary.net/pyPdf/.
    • Pypdf
  • 10
    • 84877989837 scopus 로고    scopus 로고
    • Wepawet. Http://wepawet.iseclab.org/index.php.
  • 13
    • 84877986769 scopus 로고    scopus 로고
    • November
    • Foxit reader stack overflow exploit. http://www.exploit-db.com/foxit- reader-stack-overflow-exploit-egghunter/, November 2010.
    • (2010) Foxit Reader Stack Overflow Exploit
  • 16
    • 84864919846 scopus 로고    scopus 로고
    • Jit spraying and mitigations
    • P. Bania. Jit spraying and mitigations. CoRR, http://www.piotrbania.com/ all/articles/pbania-jit-mitigations2010.pdf, 2010.
    • (2010) CoRR
    • Bania, P.1
  • 22
    • 84938793150 scopus 로고    scopus 로고
    • Detecting malicious documents with combined static and dynamic analysis
    • Technical report
    • M. Engleberth, C. Willems, and T. Holz. Detecting malicious documents with combined static and dynamic analysis. Technical report, Virus Bulletin, 2009.
    • (2009) Virus Bulletin
    • Engleberth, M.1    Willems, C.2    Holz, T.3
  • 23
    • 84876950829 scopus 로고    scopus 로고
    • Abusing file processing in malware detectors for fun and profit
    • S. Jana and V. Shmatikov. Abusing file processing in malware detectors for fun and profit. In IEEE Symposium on Security and Privacy, pages 80-94, 2012.
    • (2012) IEEE Symposium on Security and Privacy , pp. 80-94
    • Jana, S.1    Shmatikov, V.2
  • 35
    • 79956041040 scopus 로고    scopus 로고
    • D. Stevens. Escape from pdf. http://blog.didierstevens.com/2010/03/29/ escape-from-pdf/, 2010.
    • (2010) Escape from Pdf
    • Stevens, D.1
  • 37
    • 79551643515 scopus 로고    scopus 로고
    • Malicious pdf documents explained
    • Jan.
    • D. Stevens. Malicious pdf documents explained. IEEE Security and Privacy, 9(1):80-82, Jan. 2011.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.1 , pp. 80-82
    • Stevens, D.1
  • 41
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • March
    • C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security and Privacy, 5(2), March 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 42
    • 84877946763 scopus 로고    scopus 로고
    • December
    • Yahoo. Search api. http://developer.yahoo.com, December 2012.
    • (2012) Search Api


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.