Maitland: analysis of packed and encrypted malware via paravirtualization extensions

[1]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[2]  U. Bayer,et al.  TTAnalyze: A Tool for Analyzing Malware , 2006 .

[3]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[4]  Heng Yin,et al.  Renovo: a hidden code extractor for packed executables , 2007, WORM '07.

[5]  Christopher Krügel,et al.  Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.

[6]  Samuel T. King,et al.  MAVMM: Lightweight and Purpose Built VMM for Malware Analysis , 2009, 2009 Annual Computer Security Applications Conference.

[7]  Lorie M. Liebrock,et al.  Visualizing compiled executables for malware analysis , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[8]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[9]  Adrian Perrig,et al.  SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.

[10]  Mel Gorman,et al.  Understanding the Linux Virtual Memory Manager , 2004 .

[11]  Douglas S. Reeves,et al.  Polymorphic and metamorphic malware detection , 2008 .

[12]  David Lie,et al.  Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.

[13]  Arun Lakhotia,et al.  Using engine signature to detect metamorphic malware , 2006, WORM '06.

[14]  Helen J. Wang,et al.  SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[15]  Andrew H. Sung,et al.  Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.

[16]  Somesh Jha,et al.  A semantics-based approach to malware detection , 2007, POPL '07.

[17]  Heejo Lee,et al.  Detecting metamorphic malwares using code graphs , 2010, SAC '10.

[18]  Christopher Krügel,et al.  Scalable, Behavior-Based Malware Clustering , 2009, NDSS.

[19]  Wenke Lee,et al.  PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[20]  Robert Lyda,et al.  Using Entropy Analysis to Find Encrypted and Packed Malware , 2007, IEEE Security & Privacy.

[21]  Deepak Venugopal,et al.  A Malware Signature Extraction and Detection Method Applied to Mobile Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[22]  Marcus A. Maloof,et al.  Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..

[23]  Christopher Krügel,et al.  Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[24]  Felix C. Freiling,et al.  Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..

[25]  A. Kivity,et al.  kvm : the Linux Virtual Machine Monitor , 2007 .

[26]  Wenke Lee,et al.  Ether: malware analysis via hardware virtualization extensions , 2008, CCS.

[27]  Tzi-cker Chiueh,et al.  A Study of the Packer Problem and Its Solutions , 2008, RAID.

[28]  Somesh Jha,et al.  Testing malware detectors , 2004, ISSTA '04.

[29]  Tzi-cker Chiueh,et al.  Automatic Generation of String Signatures for Malware Detection , 2009, RAID.

[30]  Nirwan Ansari,et al.  Revealing Packed Malware , 2008, IEEE Security & Privacy.

[31]  Claudia Eckert,et al.  A formal model for virtual machine introspection , 2009, VMSec '09.

[32]  Somesh Jha,et al.  An architecture for generating semantics-aware signatures , 2005 .