메뉴 건너뛰기




Volumn 114 LNICST, Issue , 2013, Pages 66-80

Towards automated malware behavioral analysis and profiling for digital forensic investigation purposes

Author keywords

Dynamic malware analysis; Kernel object profiling; Malware investigation; Memory forensics; Post mortem analysis

Indexed keywords

CRIME; ELECTRONIC CRIME COUNTERMEASURES; MALWARE;

EID: 84916886217     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-39891-9_5     Document Type: Conference Paper
Times cited : (2)

References (39)
  • 7
    • 33748932391 scopus 로고    scopus 로고
    • Dynamic Analysis of Malicious Code
    • Bayer, U., et al.: Dynamic Analysis of Malicious Code. Journal in Computer Virology 2(1), 67–77 (2006)
    • (2006) Journal in Computer Virology , vol.2 , Issue.1 , pp. 67-77
    • Bayer, U.1
  • 10
    • 84858392040 scopus 로고    scopus 로고
    • A Survey on Automated Dynamic Malware Analysis Techniques and Tools
    • Egele, M., et al.: A Survey on Automated Dynamic Malware Analysis Techniques and Tools. ACM Comput. Surv. 44(2), 1–42 (2012)
    • (2012) ACM Comput. Surv. , vol.44 , Issue.2 , pp. 1-42
    • Egele, M.1
  • 18
    • 3042854565 scopus 로고    scopus 로고
    • Finite State Machine Approach to Digital Event Reconstruction
    • Gladyshev, P., Patel, A.: Finite State Machine Approach to Digital Event Reconstruction. In: Digital Investigation (2004)
    • (2004) Digital Investigation
    • Gladyshev, P.1    Patel, A.2
  • 22
    • 85175131942 scopus 로고    scopus 로고
    • Characterizing Kernel Malware Behavior With Kernel Data Access Patterns. In: Proceedings of the 6th ACM Symposium on Information
    • Rhee, J., Lin, Z., Xu, D.: Characterizing Kernel Malware Behavior With Kernel Data Access Patterns. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011)
    • (2011) Computer and Communications Security
    • Rhee, J.1    Lin, Z.2    Xu, D.3
  • 23
    • 84885885812 scopus 로고    scopus 로고
    • Malware Forensics: Investigating and Analyzing Malicious Code
    • Malin, C., Casey, E., Aquilina, J.: Malware Forensics: Investigating and Analyzing Malicious Code. Syngress (2008)
    • (2008) Syngress
    • Malin, C.1    Casey, E.2    Aquilina, J.3
  • 25
    • 77955182005 scopus 로고    scopus 로고
    • All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution
    • (Oakland 2010)
    • Schwartz, E., Avgerinos, T., Brumley, D.: All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution. In: IEEE Symposium on Security and Privacy (Oakland 2010) (2010)
    • (2010) IEEE Symposium on Security and Privacy
    • Schwartz, E.1    Avgerinos, T.2    Brumley, D.3
  • 26
    • 85025162327 scopus 로고    scopus 로고
    • Volatility.: An Advanced Memory Forensics Framework (2012), https://www.volatilesystems.com/default/volatility
    • (2012)
  • 27
    • 34447559706 scopus 로고    scopus 로고
    • The VAD Tree: A Process-Eye View of Physical Memory
    • Dolan-Gavitt, B.: The VAD Tree: A Process-Eye View of Physical Memory. In: Digital Investigation (2007)
    • (2007) Digital Investigation
    • Dolan-Gavitt, B.1
  • 30
    • 84876893644 scopus 로고    scopus 로고
    • Rootkits: Subverting the Windows Kernel
    • Hoglund, G.: Rootkits: Subverting the Windows Kernel. Addison-Wesley (2005)
    • (2005) Addison-Wesley
    • Hoglund, G.1
  • 39
    • 84867876676 scopus 로고    scopus 로고
    • Towards Automated Forensic Event Reconstruction of Malicious Code (Poster abstract)
    • Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) , Springer, Heidelberg
    • Shosha, A.F., James, J.I., Liu, C.-C., Gladyshev, P.: Towards Automated Forensic Event Reconstruction of Malicious Code (Poster abstract). In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 388–389. Springer, Heidelberg (2012)
    • (2012) RAID 2012. LNCS , vol.7462 , pp. 388-389
    • Shosha, A.F.1    James, J.I.2    Liu, C.-C.3    Gladyshev, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.