API Monitoring System for Defeating Worms and Exploits in MS-Windows System
暂无分享,去创建一个
[1] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[2] Jeffrey M. Richter. Programming Applications for Microsoft Windows with Cdrom , 1999 .
[3] Jesse C. Rabek,et al. Detection of injected, dynamically generated, and obfuscated malicious code , 2003, WORM '03.
[4] A. Wespi,et al. How to hook worms [computer network security] , 2005, IEEE Spectrum.
[5] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[6] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[7] David Moore,et al. The Spread of the Witty Worm , 2004, IEEE Secur. Priv..
[8] Elias Levy. Worm Propagation and Generic Attacks , 2005, IEEE Secur. Priv..
[9] Jeffrey Richter. Programming applications for Microsoft Windows , 1999 .
[10] Udo Payer,et al. Hybrid Engine for Polymorphic Shellcode Detection , 2005, DIMVA.