Segmented sandboxing - A novel approach to Malware polymorphism detection
暂无分享,去创建一个
[1] Daniel Bilar,et al. Opcodes as predictor for malware , 2007, Int. J. Electron. Secur. Digit. Forensics.
[2] Halvar Flake,et al. Graph-based binary analysis , 2002 .
[3] Guillaume Bonfante,et al. Morphological detection of malware , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[4] Barton P. Miller,et al. Who Wrote This Code? Identifying the Authors of Program Binaries , 2011, ESORICS.
[5] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[6] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[8] Andrew Walenstein,et al. Header information in malware families and impact on automated classifiers , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[9] Georg Wicherski,et al. peHash: A Novel Approach to Fast Malware Clustering , 2009, LEET.
[10] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[11] Steve R. White,et al. An Undetectable Computer Virus , 2000 .
[12] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[13] Andrew Walenstein,et al. Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[14] Fernando C. Colón Osorio,et al. Overcoming the limitations in computer worm models , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[15] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[16] Mattia Monga,et al. Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.
[17] Mark Stamp,et al. Hunting for metamorphic engines , 2006, Journal in Computer Virology.
[18] Hongyuan Qiu,et al. Static malware detection with Segmented Sandboxing , 2013, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE).
[19] Arun Lakhotia,et al. Using engine signature to detect metamorphic malware , 2006, WORM '06.