메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Detection of Malicious PDF Files Based on Hierarchical Document Structure

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; CLIENT SOFTWARE; COMPUTER USERS; DOCUMENT STRUCTURE; END USER SYSTEM; HIERARCHICAL DOCUMENT; PDF FILES; PDF FORMAT; SECURITY INCIDENT; SECURITY PATCHES;

EID: 85180414841     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (165)

References (38)
  • 8
    • 34249753618 scopus 로고
    • Support vector networks
    • C. Cortes and V. Vapnik. Support vector networks. Machine Learning, 20:273-297, 1995.
    • (1995) Machine Learning , vol.20 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 9
    • 77954566293 scopus 로고    scopus 로고
    • Detection and analysis of drive-by-download attacks and malicious JavaScript code
    • M. Cova, C. Kruegel, and G. Vigna. Detection and analysis of drive-by-download attacks and malicious JavaScript code. In International Conference on World Wide Web (WWW), pages 281-290, 2010.
    • (2010) International Conference on World Wide Web (WWW) , pp. 281-290
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 12
    • 85061529860 scopus 로고    scopus 로고
    • BotHunter: Detecting malware infection through IDS-driven dialog correlation
    • G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through IDS-driven dialog correlation. In USENIX Security Symposium, pages 167-182, 2007.
    • (2007) USENIX Security Symposium , pp. 167-182
    • Gu, G.1    Porras, P.2    Yegneswaran, V.3    Fong, M.4    Lee, W.5
  • 14
    • 0003684449 scopus 로고    scopus 로고
    • The Elements of Statistical Learning: data mining, inference and prediction
    • Springer, New York, N.Y., 2nd edition
    • T. Hastie, R. Tibshirani, and J. Friedman. The Elements of Statistical Learning: data mining, inference and prediction. Springer series in statistics. Springer, New York, N.Y., 2009. 2nd edition.
    • (2009) Springer series in statistics
    • Hastie, T.1    Tibshirani, R.2    Friedman, J.3
  • 16
    • 84876950829 scopus 로고    scopus 로고
    • Abusing file processing in malware detectors for fun and profit
    • S. Jana and V. Shmatikov. Abusing file processing in malware detectors for fun and profit. In IEEE Symposium on Security and Privacy, pages 80-94, 2012.
    • (2012) IEEE Symposium on Security and Privacy , pp. 80-94
    • Jana, S.1    Shmatikov, V.2
  • 18
    • 74049158178 scopus 로고    scopus 로고
    • A framework for quantitative security analysis of machine learning
    • Nov
    • P. Laskov and M. Kloft. A framework for quantitative security analysis of machine learning. In Proceedings of the 2nd ACM Workshop on AISec, pages 1-4, Nov. 2009.
    • (2009) Proceedings of the 2nd ACM Workshop on AISec , pp. 1-4
    • Laskov, P.1    Kloft, M.2
  • 20
    • 84940104123 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120-132, 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 25
    • 85180411540 scopus 로고    scopus 로고
    • PDF Reference. http://www.adobe.com/devnet/pdf/pdf reference.html, 2008.
    • (2008) PDF Reference
  • 36
    • 84958963167 scopus 로고    scopus 로고
    • Accurate buffer overflow detection via abstract payload execution
    • T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution. In Recent Adances in Intrusion Detection (RAID), pages 274-291, 2002.
    • (2002) Recent Adances in Intrusion Detection (RAID) , pp. 274-291
    • Toth, T.1    Kruegel, C.2
  • 38
    • 34047110218 scopus 로고    scopus 로고
    • CWSandbox: Towards automated dynamic binary analysis
    • C. Willems, T. Holz, and F. Freiling. CWSandbox: Towards automated dynamic binary analysis. IEEE Security and Privacy, 5(2):32-39, 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.