메뉴 건너뛰기




Volumn , Issue , 2013, Pages 607-610

PoMMaDe: Pushdown model-checking for Malware detection

Author keywords

Malware detection; Model checking; Pushdown systems

Indexed keywords

BINARY PROGRAMS; F-SECURE; MALICIOUS BEHAVIOR; MALWARE DETECTION; MALWARES; PUSHDOWN; PUSHDOWN SYSTEMS; TREND MICROS;

EID: 84883670898     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2491411.2494599     Document Type: Conference Paper
Times cited : (26)

References (24)
  • 2
    • 0036039066 scopus 로고    scopus 로고
    • The SLAM project: Debugging system software via static analysis
    • T. Ball and S. K. Rajamani. The SLAM project: debugging system software via static analysis. In POPL, 2002.
    • (2002) POPL
    • Ball, T.1    Rajamani, S.K.2
  • 3
    • 78650082281 scopus 로고    scopus 로고
    • Behavior abstraction in malware analysis
    • P. Beaucamps, I. Gnaedig, and J.-Y. Marion. Behavior abstraction in malware analysis. In RV, pages 168-182, 2010.
    • (2010) RV , pp. 168-182
    • Beaucamps, P.1    Gnaedig, I.2    Marion, J.-Y.3
  • 4
    • 84865600110 scopus 로고    scopus 로고
    • Abstraction-based malware analysis using rewriting and model checking
    • P. Beaucamps, I. Gnaedig, and J.-Y. Marion. Abstraction-based malware analysis using rewriting and model checking. In ESORICS, pages 806-823, 2012.
    • (2012) ESORICS , pp. 806-823
    • Beaucamps, P.1    Gnaedig, I.2    Marion, J.-Y.3
  • 6
    • 35348951470 scopus 로고    scopus 로고
    • The software model checker blast
    • D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. The software model checker blast. STTT, 9(5-6):505-525, 2007.
    • (2007) STTT , vol.9 , Issue.5-6 , pp. 505-525
    • Beyer, D.1    Henzinger, T.A.2    Jhala, R.3    Majumdar, R.4
  • 8
    • 35348856143 scopus 로고    scopus 로고
    • Detecting self-mutating malware using control-flow graph matching
    • D. Bruschi, L. Martignoni, and M. Monga. Detecting self-mutating malware using control-flow graph matching. In DIMVA, 2006.
    • (2006) DIMVA
    • Bruschi, D.1    Martignoni, L.2    Monga, M.3
  • 12
    • 84883676933 scopus 로고    scopus 로고
    • Hex-Rays
    • Hex-Rays. IDAPro, 2011.
    • (2011) IDAPro
  • 13
    • 84883724543 scopus 로고    scopus 로고
    • Using verification technology to specify and detect malware
    • A. Holzer, J. Kinder, and H. Veith. Using verification technology to specify and detect malware. In EUROCAST, 2007.
    • (2007) EUROCAST
    • Holzer, A.1    Kinder, J.2    Veith, H.3
  • 15
    • 78149427876 scopus 로고    scopus 로고
    • Jakstab: A static analysis platform for binaries
    • J. Kinder and H. Veith. Jakstab: A static analysis platform for binaries. In CAV, 2008.
    • (2008) CAV
    • Kinder, J.1    Veith, H.2
  • 16
    • 33751120104 scopus 로고    scopus 로고
    • A method for detecting obfuscated calls in Malicious binaries
    • A. Lakhotia, E. U. Kumar, and M. Venable. A method for detecting obfuscated calls in malicious binaries. IEEE Trans. Software Eng., 31(11), 2005.
    • (2005) IEEE Trans. Software Eng. , vol.31 , Issue.11
    • Lakhotia, A.1    Kumar, E.U.2    Venable, M.3
  • 17
    • 84883701765 scopus 로고    scopus 로고
    • PEfile. http://code.google.com/p/pefile, 2012.
    • (2012) PEfile
  • 18
    • 84946414079 scopus 로고    scopus 로고
    • Static verification of worm and virus behavior in binary executables using model checking
    • P. K. Singh and A. Lakhotia. Static verification of worm and virus behavior in binary executables using model checking. In IAW, 2003.
    • (2003) IAW
    • Singh, P.K.1    Lakhotia, A.2
  • 19
    • 84865960221 scopus 로고    scopus 로고
    • Efficient malware detection using model-checking
    • F. Song and T. Touili. Efficient malware detection using model-checking. In FM, 2012.
    • (2012) FM
    • Song, F.1    Touili, T.2
  • 20
    • 84866938634 scopus 로고    scopus 로고
    • PuMoC: A CTL model-checker for sequential programs
    • F. Song and T. Touili. PuMoC: A CTL Model-Checker for Sequential Programs. In ASE, 2012.
    • (2012) ASE
    • Song, F.1    Touili, T.2
  • 21
    • 84880088670 scopus 로고    scopus 로고
    • Pushdown model checking for malware detection
    • F. Song and T. Touili. Pushdown model checking for malware detection. In TACAS, 2012.
    • (2012) TACAS
    • Song, F.1    Touili, T.2
  • 22
    • 84880088670 scopus 로고    scopus 로고
    • LTL model-checking for malware detection
    • F. Song and T. Touili. LTL Model-Checking for Malware Detection. TACAS, 2013.
    • (2013) TACAS
    • Song, F.1    Touili, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.