Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
暂无分享,去创建一个
Koji Nakao | Daisuke Inoue | Katsunari Yoshioka | Masashi Eto | Yuji Hoshizawa | K. Yoshioka | D. Inoue | K. Nakao | Masashi Eto | Yuji Hoshizawa
[1] Ian Welch,et al. Capture - A behavioral analysis tool for applications and documents , 2007 .
[2] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[3] Koji Nakao,et al. 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis , 2006 .
[4] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[5] David Moore,et al. Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the Globe , 2003, LiSA.
[6] Farnam Jahanian,et al. The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.
[7] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[8] Van-Hau Pham,et al. on the Advantages of Deploying a Large Scale Distributed Honeypot Platform , 2005 .
[9] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[10] Ryan Cunningham,et al. Honeypot-Aware Advanced Botnet Construction and Maintenance , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[11] Felix C. Freiling,et al. The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.