Ether: malware analysis via hardware virtualization extensions
暂无分享,去创建一个
[1] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[2] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[3] Amit Vasudevan,et al. Stealth breakpoints , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[4] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[5] Kevin Borders,et al. Siren: catching evasive malware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[6] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[7] Amit Vasudevan,et al. Cobra: fine-grained malware analysis using stealth localized-executions , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[8] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[9] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[10] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[11] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[12] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[13] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[14] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[15] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[16] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[17] Shiguang Ju,et al. The Dilemma of Covert Channels Searching , 2005, ICISC.
[18] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[19] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[20] Gil Neiger,et al. Intel virtualization technology , 2005, Computer.
[21] Helen J. Wang,et al. Virtual Playgrounds for Worm Behavior Investigation , 2005, RAID.
[22] Eitan M. Gurari,et al. Introduction to the theory of computation , 1989 .
[23] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[24] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[25] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[26] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[27] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.