Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
暂无分享,去创建一个
Michalis Polychronakis | Nick Nikiforakis | Najmeh Miramirkhani | Mahathi Priya Appini | M. Polychronakis | Nick Nikiforakis | N. Miramirkhani
[1] Christopher Krügel,et al. BareBox: efficient malware analysis on bare-metal , 2011, ACSAC '11.
[2] Bülent Yener,et al. AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing , 2016, WOOT.
[3] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[4] Tilo Müller,et al. Divide-and-Conquer: Why Android Malware Cannot Be Stopped , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[5] Edgar R. Weippl,et al. Enter Sandbox: Android Sandbox Comparison , 2014, ArXiv.
[6] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[7] Peter Ferrie. Attacks on More Virtual Machine Emulators , 2007 .
[8] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[9] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[10] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.
[11] Gianluca Stringhini,et al. Shady paths: leveraging surfing crowds to detect malicious web pages , 2013, CCS.
[12] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[13] Min Gyung Kang,et al. Emulating emulation-resistant malware , 2009, VMSec '09.
[14] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[15] Chi-Sung Laih,et al. Malware Virtualization-Resistant Behavior Detection , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.
[16] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[17] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[18] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[19] Damien Deville,et al. SpyProxy: Execution-based Detection of Malicious Web Content , 2007, USENIX Security Symposium.
[20] Carsten Willems,et al. Down to the bare metal: using processor features for binary analysis , 2012, ACSAC '12.
[21] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[22] Christopher Krügel,et al. Analyzing and Detecting Malicious Flash Advertisements , 2009, 2009 Annual Computer Security Applications Conference.
[23] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[24] Tsutomu Matsumoto,et al. SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion , 2016, RAID.
[25] Christopher Krügel,et al. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware , 2013, USENIX Security Symposium.
[26] Sotiris Ioannidis,et al. Rage against the virtual machine: hindering dynamic analysis of Android malware , 2014, EuroSec '14.
[27] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[28] Nicolas Christin,et al. Evading android runtime analysis via sandbox detection , 2014, AsiaCCS.
[29] Christopher Krügel,et al. BareDroid: Large-Scale Analysis of Android Apps on Real Devices , 2015, ACSAC 2015.
[30] Alex M. Andrew,et al. Boosting: Foundations and Algorithms , 2012 .
[31] Christopher Krügel,et al. BareCloud: Bare-metal Analysis-based Evasive Malware Detection , 2014, USENIX Security Symposium.
[32] Andreas Dewald,et al. Forschungsberichte der Fakultät IV – Elektrotechnik und Informatik C UJO : Efficient Detection and Prevention of Drive-by-Download Attacks , 2010 .