메뉴 건너뛰기




Volumn , Issue , 2005, Pages 161-176

Automating mimicry attacks using static binary analysis

Author keywords

Binary analysis; Evasion; Intrusion detection; Static analysis; Symbolic execution

Indexed keywords

COMPUTER CRIME; MODEL CHECKING; MONITORING; STATIC ANALYSIS;

EID: 85077528077     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (139)

References (20)
  • 2
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fix-points
    • P. Cousot and R. Cousot. Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fix-points. In 4th ACM Symposium on Principles of Programming Languages (POPL), 1977.
    • (1977) 4th ACM Symposium on Principles of Programming Languages (POPL)
    • Cousot, P.1    Cousot, R.2
  • 10
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. King. Symbolic Execution and Program Testing. Communications of the ACM, 19(7), 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7
    • King, J.1
  • 20
    • 56749150369 scopus 로고    scopus 로고
    • Context sensitive anomaly monitoring of process control flow to detect mimicry attacks and impossible paths
    • H. Xu, W. Du, and S. Chapin. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. In Symposium on Recent Advances in Intrusion Detection (RAID), 2004.
    • (2004) Symposium on Recent Advances in Intrusion Detection (RAID)
    • Xu, H.1    Du, W.2    Chapin, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.