A Method for Shellcode Extractionfrom Malicious Document Files Using Entropy and Emulation
暂无分享,去创建一个
[1] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[2] Hiroki Nogawa,et al. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation , 2009, IEICE Trans. Inf. Syst..
[3] Christopher Krügel,et al. Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode , 2011, RAID.
[4] Koji Nakao,et al. Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity , 2008, 2008 IEEE International Conference on Communications.
[5] Koji Nakao,et al. Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities , 2009, IEICE Trans. Inf. Syst..
[6] Ricardo J. Rodríguez,et al. Detection of Intrusions and Malware, and Vulnerability Assessment , 2016, Lecture Notes in Computer Science.
[7] Salvatore J. Stolfo,et al. A Study of Malcode-Bearing Documents , 2007, DIMVA.
[8] Evangelos P. Markatos,et al. Network-level polymorphic shellcode detection using emulation , 2006, Journal in Computer Virology.
[9] Marco Ramilli,et al. Return-Oriented Programming , 2012, IEEE Security & Privacy.