메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Frankenstein: Stitching malware from benign binaries

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; ENGINES;

EID: 85084161758     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (26)

References (23)
  • 2
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H.-A. Kim and B. Karp, “Autograph: Toward automated, distributed worm signature detection,” in Proc. Conf. on USENIX Security Sym., vol. 13, 2004, pp. 271–286.
    • (2004) Proc. Conf. On USENIX Security Sym. , vol.13 , pp. 271-286
    • Kim, H.-A.1    Karp, B.2
  • 3
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signatures using honeypots
    • C. Kreibich and J. Crowcroft, “Honeycomb: Creating intrusion detection signatures using honeypots,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 1, pp. 51–56, 2004.
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.1 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2
  • 4
    • 33751064824 scopus 로고    scopus 로고
    • Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
    • Z. Li, M. Sanghi, Y. Chen, M.-Y. Kao, and B. Chavez, “Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience,” in Proc. IEEE Sym. on Security & Privacy (S&P), 2006, pp. 32–47.
    • (2006) Proc. IEEE Sym. On Security & Privacy (S&P) , pp. 32-47
    • Li, Z.1    Sanghi, M.2    Chen, Y.3    Kao, M.-Y.4    Chavez, B.5
  • 5
    • 27544498978 scopus 로고    scopus 로고
    • PolyGraph: Automatically generating signatures for polymorphic worms
    • J. Newsome, B. Karp, and D. Song, “Polygraph: Automatically generating signatures for polymorphic worms,” in Proc. IEEE Sym. on Security & Privacy (S&P), 2005, pp. 226–241.
    • (2005) Proc. IEEE Sym. On Security & Privacy (S&P) , pp. 226-241
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 9
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • R. Lyda and J. Hamrock, “Using entropy analysis to find encrypted and packed malware,” IEEE Security & Privacy, vol. 5, no. 2, pp. 40–45, 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 12
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham, “The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86),” in Proc. ACM Conf. on Computer and Communications Security (CCS), 2007, pp. 552–561.
    • (2007) Proc. ACM Conf. On Computer and Communications Security (CCS) , pp. 552-561
    • Shacham, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.