메뉴 건너뛰기




Volumn 8976, Issue , 2015, Pages 34-48

ZombieCoin: Powering next-generation botnets with bitcoin

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MALWARE; WEARABLE TECHNOLOGY;

EID: 84950253378     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-48051-9_3     Document Type: Conference Paper
Times cited : (46)

References (55)
  • 6
    • 84950249995 scopus 로고    scopus 로고
    • The New Yorker, April 2013. Accessed on 22 July
    • Bustillos, M.: The Bitcoin Boom. The New Yorker, April 2013. Accessed on 22 July 2014.
    • (2014) The Bitcoin Boom
    • Bustillos, M.1
  • 9
    • 84882582017 scopus 로고    scopus 로고
    • An inside look at botnets
    • Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.),. Springer, New York
    • Barford, P., Yegneswaran, V.: An inside look at botnets. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.) Malware Detection. Advances in Information Security, vol. 27, pp. 171-191. Springer, New York (2007).
    • (2007) Malware Detection. Advances in Information Security , vol.27 , pp. 171-191
    • Barford, P.1    Yegneswaran, V.2
  • 16
    • 84950290678 scopus 로고    scopus 로고
    • Accessed on 22 July Symantec Security Response Blog, October 2009
    • Lelli, A.: Trojan. Whitewell: What's your (bot) Facebook Status Today? Symantec Security Response Blog, October 2009. http://www. symantec. com/connect/blogs/trojanwhitewell-what-s-your-bot-facebook-status-today. Accessed on 22 July 2014.
    • (2014) Trojan. Whitewell: What's your (bot) Facebook Status Today?
    • Lelli, A.1
  • 20
    • 84883055523 scopus 로고    scopus 로고
    • Bitcoin Wiki. Accessed 22 July 2014
    • Protocol Specification. Bitcoin Wiki. Accessed 22 July 2014.
    • Protocol Specification
  • 22
    • 84950302908 scopus 로고    scopus 로고
    • Bitcoin Foundation, 24 October 2013. Accessed on 4 Aug
    • Andresen, G.: Core Development Update #5. Bitcoin Foundation, 24 October 2013. Accessed on 4 Aug 2014.
    • (2014) Core Development Update #5
    • Andresen, G.1
  • 25
    • 84875487747 scopus 로고    scopus 로고
    • Accessed on 22 July 0. 5, January 2012
    • Willet, J. R.: The Second Bitcoin Whitepaper, v. 0. 5, January 2012. https://sites. google. com/site/2ndbtcwpaper/2ndBitcoinWhitepaper. pdf. Accessed on 22 July 2014.
    • (2014) The Second Bitcoin Whitepaper
    • Willet, J.R.1
  • 27
    • 84916608100 scopus 로고    scopus 로고
    • Elliptic curve cryptography in practice
    • Christin, N., Safavi-Naini, R. (eds.),. Springer, Heidelberg. IACR Cryptology ePrint Archive
    • Bos, J. W., Halderman, J. A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 156-174. Springer, Heidelberg (2014). IACR Cryptology ePrint Archive.
    • (2014) FC 2014. LNCS , vol.8437 , pp. 156-174
    • Bos, J.W.1    Halderman, J.A.2    Heninger, N.3    Moore, J.4    Naehrig, M.5    Wustrow, E.6
  • 28
    • 84865832159 scopus 로고    scopus 로고
    • CommitCoin: Carbon dating commitments with bitcoin
    • Keromytis, A.D. (ed.),. Springer, Heidelberg
    • Clark, J., Essex, A.: CommitCoin: carbon dating commitments with bitcoin. In: Keromytis, A. D. (ed.) FC 2012. LNCS, vol. 7397, pp. 390-398. Springer, Heidelberg (2012).
    • (2012) FC 2012. LNCS , vol.7397 , pp. 390-398
    • Clark, J.1    Essex, A.2
  • 29
    • 0001217738 scopus 로고
    • The prisoners problem and the subliminal channel
    • Chaum, D. (ed.),. Springer, Cambridge
    • Simmons, G. J.: The prisoners problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology, pp. 51-67. Springer, Cambridge (1984).
    • (1984) Advances in Cryptology , pp. 51-67
    • Simmons, G.J.1
  • 30
    • 84985824882 scopus 로고
    • The subliminal channel and digital signatures
    • Beth, T., Cot, N., Ingemarsson, I. (eds.),. Springer, Heidelberg
    • Simmons, G. J.: The subliminal channel and digital signatures. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 364-378. Springer, Heidelberg (1985).
    • (1985) EUROCRYPT 1984. LNCS , vol.209 , pp. 364-378
    • Simmons, G.J.1
  • 34
    • 84857255431 scopus 로고    scopus 로고
    • Revisiting traffic anomaly detection using software defined networking
    • Sommer, R., Balzarotti, D., Maier, G. (eds.),. Springer, Heidelberg
    • Mehdi, S. A., Khalid, J., Khayam, S. A.: Revisiting traffic anomaly detection using software defined networking. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 161-180. Springer, Heidelberg (2011).
    • (2011) RAID 2011. LNCS , vol.6961 , pp. 161-180
    • Mehdi, S.A.1    Khalid, J.2    Khayam, S.A.3
  • 43
    • 56549101103 scopus 로고    scopus 로고
    • A first step towards live botmaster traceback
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.),. Springer, Heidelberg
    • Ramsbrock, D., Wang, X., Jiang, X.: A first step towards live botmaster traceback. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 59-77. Springer, Heidelberg (2008).
    • (2008) RAID 2008. LNCS , vol.5230 , pp. 59-77
    • Ramsbrock, D.1    Wang, X.2    Jiang, X.3
  • 45
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • Gu, G., Perdisci, R., Zhang, J., Lee, W. et al.: Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. In: USENIX Security Symposium, pp. 139-154 (2008).
    • (2008) USENIX Security Symposium , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 46
    • 85061529860 scopus 로고    scopus 로고
    • Bothunter: Detecting malware infection through ids-driven dialog correlation
    • Gu, G., Porras, P. A., Yegneswaran, V., Fong, M. W., Lee, W.: Bothunter: detecting malware infection through ids-driven dialog correlation. USENIX Secur. 7, 1-16 (2007).
    • (2007) USENIX Secur , vol.7 , pp. 1-16
    • Gu, G.1    Porras, P.A.2    Yegneswaran, V.3    Fong, M.W.4    Lee, W.5
  • 51
    • 77955020947 scopus 로고    scopus 로고
    • Take a deep breath: A stealthy, resilient and cost-effective botnet using skype
    • Kreibich, C., Jahnke, M. (eds.),. Springer, Heidelberg
    • Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M., Cavallaro, L.: Take a deep breath: a stealthy, resilient and cost-effective botnet using skype. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 81-100. Springer, Heidelberg (2010).
    • (2010) DIMVA 2010. LNCS , vol.6201 , pp. 81-100
    • Nappa, A.1    Fattori, A.2    Balduzzi, M.3    Dell'Amico, M.4    Cavallaro, L.5
  • 53
    • 80052986561 scopus 로고    scopus 로고
    • Stegobot: A covert social network botnet
    • Filler, T., Pevný, T., Craver, S., Ker, A. (eds.),. Springer, Heidelberg
    • Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P., Borisov, N.: Stegobot: a covert social network botnet. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 299-313. Springer, Heidelberg (2011).
    • (2011) IH 2011. LNCS , vol.6958 , pp. 299-313
    • Nagaraja, S.1    Houmansadr, A.2    Piyawongwisal, P.3    Singh, V.4    Agarwal, P.5    Borisov, N.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.