Shadow attacks: automatically evading system-call-behavior based malware detection
暂无分享,去创建一个
Guofei Gu | Weiqin Ma | Jyh-Charn Liu | Sanmin Liu | Pu Duan
[1] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[2] Jean-Pierre Seifert,et al. On the power of simple branch prediction analysis , 2007, ASIACCS '07.
[3] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[4] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[5] V. E. Kamensky,et al. MARSHALLING IN DISTRIBUTED SYSTEMS: TWO APPROACHES , 2007 .
[6] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[8] John C. Mitchell,et al. Characterizing Bots' Remote Control Behavior , 2007, DIMVA.
[9] W. Richard Stevens,et al. UNIX network programming, volume 2 (2nd ed.): interprocess communications , 1998 .
[10] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[11] Somesh Jha,et al. A Layered Architecture for Detecting Malicious Behaviors , 2008, RAID.
[12] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[13] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[14] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[15] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[16] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[17] Brian Kernighan,et al. An efficient heuristic for partitioning graphs , 1970 .
[18] W. Richard Stevens,et al. Unix network programming , 1990, CCRV.
[19] Abhinav Srivastava,et al. System Call API Obfuscation (Extended Abstract) , 2008, RAID.
[20] Xuxian Jiang,et al. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[21] Christopher Krügel,et al. Automating Mimicry Attacks Using Static Binary Analysis , 2005, USENIX Security Symposium.
[22] Eric Filiol,et al. Formalisation and implementation aspects of K-ary (malicious) codes , 2007, Journal in Computer Virology.
[23] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[24] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[25] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[26] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[27] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .