메뉴 건너뛰기




Volumn , Issue , 2006, Pages 67-76

A taxonomy of protections used in computer viruses and their applications to software protection

Author keywords

Computer viruses; Malicious code; Malware; Software protection; Taxonomy

Indexed keywords

APPLICATION PROGRAMS; COMPUTER ARCHITECTURE; COMPUTER VIRUSES; REVERSE ENGINEERING; TAXONOMIES;

EID: 84896284654     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (14)
  • 1
    • 84896307818 scopus 로고    scopus 로고
    • Encryption: Practice
    • (alias), 29A Ezine online, 14 Aug 2005
    • Blade Runner (alias) (1996) "Encryption: Practice", [online], 29A Ezine, Vol. 1.2_2. http://www.madchat.org/vxdevl/vxmags/29a-1/29A%231.2_2. [14 Aug 2005].
    • (1996) , vol.1-2
    • Runner, B.1
  • 2
    • 0004046658 scopus 로고    scopus 로고
    • A Taxonomy of Obfuscating Transformations
    • Department of Computer Science, University of Auckland, 1997
    • Collberg, C., Thomborson, C., and Low, D. (1997) "A Taxonomy of Obfuscating Transformations." Department of Computer Science, University of Auckland, 1997.
    • (1997)
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 3
    • 84896278892 scopus 로고    scopus 로고
    • Hide 'n' Seek? Anatomy of Stealth Malware
    • online, 2003, 4 Sep 2005
    • Erdelyi, G. (2003) "Hide 'n' Seek? Anatomy of Stealth Malware", [online], Virus Bulletin, 2003. http://www.google.com/url?sa=t&ct=res&cd=1&url=http%3A//www.blackhat.com/presentations/bh-europe-04/bh-eu-04-erdelyi/bh-eu-04-erdelyi-paper.pdf&ei=kowdQ7OaN8L8iQHW08mKCw [4 Sep 2005].
    • (2003) Virus Bulletin
    • Erdelyi, G.1
  • 4
    • 78651564650 scopus 로고    scopus 로고
    • F-Secure virus descriptions
    • F-Secure, online, 15 Nov 2005
    • F-Secure (2005) "F-Secure virus descriptions", [online], http://www.f-secure.com/v-descs/. [15 Nov 2005].
    • (2005)
  • 5
    • 84896288009 scopus 로고    scopus 로고
    • Gollum Virus
    • (alias), 29A Ezine, online, 21 Aug 2005
    • GriYo (alias) (1997) "Gollum Virus", [online], 29A Ezine, Vol. 2.3_A. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.3_A. [21 Aug 2005].
    • (1997) , vol.2-3 A
    • GriYo1
  • 6
    • 84896277920 scopus 로고    scopus 로고
    • Win32.Cabanas.2999
    • (alias), 29A Ezine, online, 14 Aug 2005
    • Jack Qwerty (alias) (1997a) "Win32.Cabanas.2999", [online], 29A Ezine, Vol. 2.3_6. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.3_6. [14 Aug 2005].
    • (1997) , vol.2-3
    • Qwerty, J.1
  • 7
    • 84896264697 scopus 로고    scopus 로고
    • Win32.Jacky.1440
    • (alias), online, 29A Ezine, 21 Aug 2005
    • Jack Qwerty (alias) (1997b) "Win32.Jacky.1440", [online], 29A Ezine, Vol. 2.3_7. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.3_7. [21 Aug 2005].
    • (1997) , vol.2-3
    • Qwerty, J.1
  • 8
    • 84896304300 scopus 로고    scopus 로고
    • Hide 'N Seek Revisited - Full Stealth is Back
    • Virus Bulletin Conference. October 2005
    • Kasslin, K., Stahlberg, M., Larvala, S. and Tikkanen, A. (2005) "Hide 'N Seek Revisited - Full Stealth is Back", Virus Bulletin Conference. October 2005.
    • (2005)
    • Kasslin, K.1    Stahlberg, M.2    Larvala, S.3    Tikkanen, A.4
  • 9
    • 84896262752 scopus 로고    scopus 로고
    • Analysis on the Decryptor Generation
    • (alias),29A Ezine online, 21 Aug 2005
    • Lord Julus (alias) (1997) "Analysis on the Decryptor Generation", [online], 29A Ezine, Vol. 2.2_9. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.2_9. [21 Aug 2005].
    • (1997) , vol.2
    • Julus, L.1
  • 10
    • 84896288501 scopus 로고    scopus 로고
    • Win32 Bait Detection
    • SnakeByte, (alias), online, 14 Nov 2005
    • SnakeByte (alias) (2004) "Win32 Bait Detection", [online], http://madchat.org/vxdevl/papers/vxers/SnakeByte/w32bd.txt. [14 Nov 2005].
    • (2004)
  • 11
    • 84896300104 scopus 로고    scopus 로고
    • ELVIRA virus
    • Spanksa, alias, online, 29A Ezine, 28 Aug 2005
    • Spanksa (alias) (1997) "ELVIRA virus", [online], 29A Ezine, Vol. 2.4_B. http://www.madchat.org/vxdevl/vxmags/29a-2/29A%232.4_B [28 Aug 2005].
    • (1997) , vol.2-4 B
  • 12
    • 33646414637 scopus 로고    scopus 로고
    • The Art of Computer Virus Research and Defense
    • Addison-Wesley, Feb
    • Szor, P. (2005) The Art of Computer Virus Research and Defense. Addison-Wesley, Feb. 2005.
    • (2005)
    • Szor, P.1
  • 13
    • 84896294236 scopus 로고
    • Virus Prevalence - 1995
    • Virus Btn, online, 28 Aug 2005
    • Virus Btn (1995) "Virus Prevalence - 1995", [online], http://www.virusbtn.com/resources/malwareDirectory/prevalence/index.xml?year=1995. [28 Aug 2005].
    • (1995)
  • 14
    • 84896265129 scopus 로고    scopus 로고
    • Virus Prevalence - 2004
    • Virus Btn, online, 28 Aug 2005
    • Virus Btn (2004) "Virus Prevalence - 2004", [online], http://www.virusbtn.com/resources/malwareDirectory/prevalence/index.xml?year=2004. [28 Aug 2005].
    • (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.