메뉴 건너뛰기




Volumn , Issue , 2011, Pages 395-410

Cloaking malware with the trusted platform module

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; HARDWARE SECURITY; TRUSTED COMPUTING;

EID: 85076455369     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (54)

References (59)
  • 1
    • 85076465718 scopus 로고    scopus 로고
    • MyDoom.C Analysis
    • MyDoom.C Analysis, 2004. http://www.secureworks. com/research/threats/mydoom-c/.
    • (2004)
  • 2
    • 85076458856 scopus 로고    scopus 로고
    • W32/MyDoom@MM
    • W32/MyDoom@MM, 2005. http://vil.nai.com/vil/ content/v_100983.htm.
    • (2005)
  • 3
    • 85076497986 scopus 로고    scopus 로고
    • W32/AutoRun.GM. F-Secure
    • W32/AutoRun.GM. F-Secure, 2006. http://http: //www.f-secure.com/v-descs/worm_w32_ autorun_gm.shtml.
    • (2006)
  • 5
    • 85076470209 scopus 로고    scopus 로고
    • Owning Kraken Zombies, a Detailed Discussion
    • Owning Kraken Zombies, a Detailed Discussion, 2008. http://dvlabs.tippingpoint.com/blog/2008/ 04/28/owning-kraken-zombies.
    • (2008)
  • 8
    • 85076484546 scopus 로고    scopus 로고
    • Intel Trusted Execution Technology (Intel TXT)MLE Developer's Guide
    • Intel Trusted Execution Technology (Intel TXT)MLE Developer's Guide, 2009.
    • (2009)
  • 9
    • 84871339177 scopus 로고    scopus 로고
    • ST Microelectronics
    • ST Microelectronics, 2010. Private communication.
    • (2010) Private Communication
  • 11
    • 84890778445 scopus 로고    scopus 로고
    • Embedded security
    • Embedded security. Infineon Technologies, 2010. http:// www.infineon.com/tpm.
    • (2010) Infineon Technologies
  • 14
    • 85076460696 scopus 로고    scopus 로고
    • Wave Systems Corporation
    • Trusted Computing Whitepaper. Wave Systems Corporation, 2010. http://www.wave.com/collateral/Trusted_ Computing_White_Paper.pdf.
    • (2010) Trusted Computing Whitepaper
  • 16
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • AH KIM, H., AND KARP, B. Autograph: Toward Automated, Distributed Worm Signature Detection. In USENIX Security (2004).
    • (2004) USENIX Security
    • Kim, A.H.1    Karp, B.2
  • 20
    • 74049095923 scopus 로고    scopus 로고
    • Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
    • CABALLERO, J., POOSANKAM, P., KREIBICH, C., AND SONG, D. Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-engineering. In CCS (2009).
    • (2009) CCS
    • Caballero, J.1    Poosankam, P.2    Kreibich, C.3    Song, D.4
  • 21
    • 77953274755 scopus 로고    scopus 로고
    • Attack, solution, and verification for shared authorisation data in tcg tpm
    • Springer
    • CHEN, L., AND RYAN, M. Attack, Solution, and Verification for Shared Authorisation Data in TCG TPM. vol. 5983 of Lecture Notes in Computer Science. Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.5983
    • Chen, L.1    Ryan, M.2
  • 22
    • 85076466504 scopus 로고    scopus 로고
    • CHIEN, E. CodeRed Worm, 2007. http://www.symantec. com/security_response/writeup.jsp?docid= 2001-071911-5755-99.
    • (2007) CodeRed Worm
    • Chien, E.1
  • 23
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • CHRISTODORESCU, M., AND JHA, S. Static Analysis of Executables to Detect Malicious Patterns. In USENIX Security (2003).
    • (2003) USENIX Security
    • Christodorescu, M.1    Jha, S.2
  • 25
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • DOLEV, D., DWORK, C., AND NAOR, M. Nonmalleable cryptography. SIAM J. Comput. 30, 2 (2000), 391-437.
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 28
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • GENTRY, C. Fully homomorphic encryption using ideal lattices. In STOC (2009), pp. 169-178.
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 30
    • 85076496448 scopus 로고    scopus 로고
    • Large-scale malware indexing using function-call graphs
    • HU, X., CKER CHIUEH, T., AND SHIN, K. G. Large-scale Malware Indexing Using Function-call Graphs. In CCS (2009).
    • (2009) CCS
    • Hu, X.1    Cker Chiueh, T.2    Shin, K.G.3
  • 32
    • 85077706009 scopus 로고    scopus 로고
    • Oslo: Improving the security of trusted computing
    • KAUER, B. OSLO: Improving the security of trusted computing. In USENIX Security (2007).
    • (2007) USENIX Security
    • Kauer, B.1
  • 33
    • 54049158076 scopus 로고    scopus 로고
    • Kvm: The linux virtual machine monitor
    • KIVITY, A. kvm: The Linux Virtual Machine Monitor. In Ottawa Linux Symposium (2007).
    • (2007) Ottawa Linux Symposium
    • Kivity, A.1
  • 36
    • 84885687023 scopus 로고    scopus 로고
    • Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
    • KOLBITSCH, C., HOLZ, T., KRUEGEL, C., AND KIRDA, E. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries. In IEEE S&P (2010).
    • (2010) IEEE S&P
    • Kolbitsch, C.1    Holz, T.2    Kruegel, C.3    Kirda, E.4
  • 41
    • 85018519069 scopus 로고    scopus 로고
    • Safe passage for passwords and other sensitive data
    • MCCUNE, J. M., PERRIG, A., AND REITER, M. K. Safe passage for passwords and other sensitive data. In NDSS (2009).
    • (2009) NDSS
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 42
    • 85013589618 scopus 로고    scopus 로고
    • Institution of Electrical Engineers
    • MITCHELL, C. J., Ed. Trusted Computing. Institution of Electrical Engineers, 2005.
    • (2005) Trusted Computing
    • Mitchell, C.J.1
  • 44
    • 79958721762 scopus 로고    scopus 로고
    • The modern rogue - Malware with a face
    • O'DEA, H. The Modern Rogue - Malware with a Face. In Virus Bulletin Conference (2009).
    • (2009) Virus Bulletin Conference
    • O'dea, H.1
  • 46
    • 85076470250 scopus 로고    scopus 로고
    • POST, A. W32.Storm.Worm, 2007. http://www.symantec. com/security_response/writeup.jsp?docid= 2001-060615-1534-99.
    • (2007) W32.Storm.Worm
    • Post, A.1
  • 51
    • 83455177098 scopus 로고    scopus 로고
    • Hacking the smartcard chip
    • TARNOVSKY, C. Hacking the Smartcard Chip. In Black Hat (2010).
    • (2010) Black Hat
    • Tarnovsky, C.1
  • 58
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • YIN, H., SONG, D., EGELE, M., KRUEGEL, C., AND KIRDA, E. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In CCS (2007).
    • (2007) CCS
    • Yin, H.1    Song, D.2    Egele, M.3    Kruegel, C.4    Kirda, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.