Efficient Detection of Split Personalities in Malware
暂无分享,去创建一个
Christopher Krügel | Giovanni Vigna | Engin Kirda | Davide Balzarotti | Marco Cova | Christoph Karlberger | Christopher Krügel | E. Kirda | D. Balzarotti | M. Cova | G. Vigna | Christoph Karlberger
[1] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[2] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[3] Koen De Bosschere,et al. TORNADO: A Novel Input Replay Tool , 2003, PDPTA.
[4] Min Gyung Kang,et al. Emulating emulation-resistant malware , 2009, VMSec '09.
[5] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[7] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[8] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[9] Lorenzo Martignoni,et al. Testing CPU emulators , 2009, ISSTA.
[10] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[11] Engin Kirda,et al. Insights into current malware behavior , 2009 .
[12] Zhenkai Liang,et al. Automatically Identifying Trigger-based Behavior in Malware , 2008, Botnet Detection.
[13] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[14] Amit Vasudevan,et al. Stealth breakpoints , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[15] Amit Vasudevan,et al. Cobra: fine-grained malware analysis using stealth localized-executions , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[16] Somesh Jha,et al. A Layered Architecture for Detecting Malicious Behaviors , 2008, RAID.
[17] Tzi-cker Chiueh,et al. A Forced Sampled Execution Approach to Kernel Rootkit Identification , 2007, RAID.
[18] Yasushi Saito,et al. Jockey: a user-space library for record-replay debugging , 2005, AADEBUG'05.
[19] Kevin P. Lawton. Bochs: A Portable PC Emulator for Unix/X , 1996 .
[20] Mark Christiaens,et al. A Taxonomy of Execution Replay Systems , 2003 .
[21] Srikanth Kandula,et al. Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging , 2004, USENIX Annual Technical Conference, General Track.
[22] Benny Pinkas,et al. Cryptanalysis of the windows random number generator , 2007, CCS '07.
[23] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[24] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[25] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[26] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[27] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[28] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[29] Zhendong Su,et al. ExecRecorder: VM-based full-system replay for attack analysis and system recovery , 2006, ASID '06.
[30] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[31] Mikael Fortelius,et al. Cutting edge , 2009 .