메뉴 건너뛰기




Volumn 36, Issue , 2008, Pages 65-88

Automatically identifying trigger-based behavior in malware

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84882738195     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-68768-1_4     Document Type: Article
Times cited : (154)

References (29)
  • 2
    • 84882738624 scopus 로고    scopus 로고
    • QEMU. http://www.qemu.org.
    • QEMU
  • 3
    • 84882756833 scopus 로고    scopus 로고
    • Tribal flood network. http://www.cert.org/incident_notes/IN-99-07.html.
    • Tribal Flood Network
  • 5
    • 35048903951 scopus 로고    scopus 로고
    • Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science
    • David Brumley and James Newsome. Alias analysis for assembly. Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science, 2006.
    • (2006) Alias Analysis For Assembly
    • Brumley, D.1    Newsome, J.2
  • 7
    • 35048861896 scopus 로고    scopus 로고
    • A tool for checking ANSI-C programs
    • Kurt Jensen and Andreas Podelski, editors, of Lecture Notes in Computer Science, Springer
    • Edmund Clarke, Daniel Kroening, and Flavio Lerda. A tool for checking ANSI-C programs. In Kurt Jensen and Andreas Podelski, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004), volume 2988 of Lecture Notes in Computer Science, pages 168-176. Springer, 2004.
    • (2004) Tools and Algorithms For the Construction and Analysis of Systems (TACAS 2004) , vol.2988 , pp. 168-176
    • Clarke, E.1    Kroening, D.2    Lerda, F.3
  • 9
    • 84882779388 scopus 로고    scopus 로고
    • Tony Lee Peter Ferrie. Win32.Netsky.C. http://www.symantec.com/security_response/writeup.jsp?docid=2004-022417%-4628-99.
    • Win32.Netsky.C
    • Ferrie, T.L.P.1
  • 13
    • 84882745155 scopus 로고    scopus 로고
    • Gettis. W32.Mydoom.B@mm. http://www.symantec.com/security_response/writeup.jsp?docid=2004-022011%-2447-99.
    • W32.Mydoom.B@mm
  • 15
    • 78249237743 scopus 로고    scopus 로고
    • Ha. Keylogger.Stawin. http://www.symantec.com/security_response/writeup.jsp?docid=2004-012915%-2315-99.
    • Keylogger.Stawin
  • 16
    • 84882809430 scopus 로고    scopus 로고
    • . Neal Hindocha. Win32.Netsky.D. http://www.symantec.com/security_response/writeup.jsp?docid=2004-030110%-0232-99.
    • Win32.Netsky.D
    • Hindocha, N.1
  • 17
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • James King. Symbolic execution and program testing. Communications of the ACM, 19:386-394, 1976.
    • (1976) Communications of the ACM , vol.19 , pp. 386-394
    • King, J.1
  • 18
    • 78249252524 scopus 로고    scopus 로고
    • McAfee
    • McAfee. W97M/Opey.C. http://vil.nai.com/vil/content/v_10290.htm.
    • W97M/Opey.C
  • 23
    • 84882760061 scopus 로고    scopus 로고
    • Symantec. Spyware.e2give. http://www.symantec.com/securityresponse/writeup.jsp?docid=2004-102614-1006-99.
    • Symantec. Spyware.e2give
  • 24
    • 84882764319 scopus 로고    scopus 로고
    • Symantec. Xeram.1664. http://www.symantec.com/security_response/writeup.jsp?docid=2000-121913-2839-99.
    • Symantec. Xeram.1664


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.