메뉴 건너뛰기




Volumn , Issue , 2014, Pages 271-282

Malware detection with quantitative data flow graphs

Author keywords

Behavioral malware analysis; Data flow tracking; Intrusion detection; Malware detection; Quantitative data flows

Indexed keywords

COMPUTER CRIME; DATA FLOW GRAPHS; DATA TRANSFER; FLOW GRAPHS; GRAPHIC METHODS; INTRUSION DETECTION; MALWARE; WINDOWS OPERATING SYSTEM;

EID: 84984905603     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2590296.2590319     Document Type: Conference Paper
Times cited : (51)

References (33)
  • 3
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • J.-M. Borello and L. Me. Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology, pages 211-220, 2008.
    • (2008) Journal in Computer Virology , pp. 211-220
    • Borello, J.-M.1    Me, L.2
  • 6
    • 84881102082 scopus 로고    scopus 로고
    • A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
    • G. Creech and J. Hu. A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. Computers, IEEE Transactions on, pages 1-1, 2013.
    • (2013) Computers, IEEE Transactions on , pp. 1
    • Creech, G.1    Hu, J.2
  • 11
    • 80051684605 scopus 로고    scopus 로고
    • Dynamic behavior matching: A complexity analysis and new approximation algorithms
    • M. Fredrikson, M. Christodorescu, and S. Jha. Dynamic behavior matching: A complexity analysis and new approximation algorithms. Automated Deduction-CADE-23, pages 252-267, 2011.
    • (2011) Automated Deduction-CADE-23 , pp. 252-267
    • Fredrikson, M.1    Christodorescu, M.2    Jha, S.3
  • 16
    • 85076206522 scopus 로고    scopus 로고
    • Effective and efficient malware detection at the end host
    • C. Kolbitsch and P. Comparetti. Effective and Efficient Malware Detection at the End Host. USENIX, 2009.
    • (2009) USENIX
    • Kolbitsch, C.1    Comparetti, P.2
  • 22
    • 84888873413 scopus 로고    scopus 로고
    • Deriving common malware behavior through graph clustering
    • Y. Park, D. S. Reeves, and M. Stamp. Deriving common malware behavior through graph clustering. Computers & Security, 2013.
    • (2013) Computers & Security
    • Park, Y.1    Reeves, D.S.2    Stamp, M.3
  • 27
    • 85156147536 scopus 로고    scopus 로고
    • Impeding malware analysis using conditional code obfuscation
    • M. I. Sharif, A. Lanzi, J. T. Giffin, and W. Lee. Impeding malware analysis using conditional code obfuscation. In NDSS, 2008.
    • (2008) NDSS
    • Sharif, M.I.1    Lanzi, A.2    Giffin, J.T.3    Lee, W.4
  • 33
    • 79952099736 scopus 로고    scopus 로고
    • Malware obfuscation techniques: A brief survey. in Broadband, Wireless Computing, Communication and Applications (BWCCA)
    • I. You and K. Yim. Malware obfuscation techniques: A brief survey. In Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on, pages 297-300, 2010.
    • (2010) 2010 International Conference on , pp. 297-300
    • You, I.1    Yim, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.