Maitland: analysis of packed and encrypted malware via paravirtualization extensions
暂无分享,去创建一个
[1] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[2] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[3] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[4] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[5] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[6] Samuel T. King,et al. MAVMM: Lightweight and Purpose Built VMM for Malware Analysis , 2009, 2009 Annual Computer Security Applications Conference.
[7] Lorie M. Liebrock,et al. Visualizing compiled executables for malware analysis , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[8] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[9] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[10] Mel Gorman,et al. Understanding the Linux Virtual Memory Manager , 2004 .
[11] Douglas S. Reeves,et al. Polymorphic and metamorphic malware detection , 2008 .
[12] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[13] Arun Lakhotia,et al. Using engine signature to detect metamorphic malware , 2006, WORM '06.
[14] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[15] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[16] Somesh Jha,et al. A semantics-based approach to malware detection , 2007, POPL '07.
[17] Heejo Lee,et al. Detecting metamorphic malwares using code graphs , 2010, SAC '10.
[18] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[19] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[20] Robert Lyda,et al. Using Entropy Analysis to Find Encrypted and Packed Malware , 2007, IEEE Security & Privacy.
[21] Deepak Venugopal,et al. A Malware Signature Extraction and Detection Method Applied to Mobile Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[22] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[23] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[24] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[25] A. Kivity,et al. kvm : the Linux Virtual Machine Monitor , 2007 .
[26] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[27] Tzi-cker Chiueh,et al. A Study of the Packer Problem and Its Solutions , 2008, RAID.
[28] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[29] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[30] Nirwan Ansari,et al. Revealing Packed Malware , 2008, IEEE Security & Privacy.
[31] Claudia Eckert,et al. A formal model for virtual machine introspection , 2009, VMSec '09.
[32] Somesh Jha,et al. An architecture for generating semantics-aware signatures , 2005 .