Detecting Hardware-Assisted Virtualization
暂无分享,去创建一个
[1] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[2] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[3] Carsten Willems,et al. CXPInspector: Hypervisor-Based, Hardware-Assisted System Monitoring , 2012 .
[4] Martina Lindorfer,et al. Detecting Environment-Sensitive Malware , 2011, RAID.
[5] Evangelos P. Markatos,et al. Comprehensive shellcode detection using runtime heuristics , 2010, ACSAC '10.
[6] Niels Provos,et al. SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks , 2011, USENIX Security Symposium.
[7] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[8] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Levente Buttyán,et al. nEther: in-guest detection of out-of-the-guest malware analyzers , 2011, EUROSEC '11.
[10] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[11] Digit Oktavianto,et al. Cuckoo Malware Analysis , 2013 .
[12] Jonathon T. Giffin,et al. Automatic Reverse Engineering of Malware Emulators , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[13] Davide Balzarotti,et al. SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers , 2015, 2015 IEEE Symposium on Security and Privacy.
[14] Tal Garfinkel,et al. Compatibility Is Not Transparency: VMM Detection Myths and Realities , 2007, HotOS.
[15] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[16] Rolf Rolles,et al. Unpacking Virtualization Obfuscators , 2009, WOOT.
[17] Herbert Bos,et al. Large-Scale Analysis of Malware Downloaders , 2012, DIMVA.
[18] Leyla Bilge,et al. The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics , 2015, CCS.
[19] David Brumley,et al. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components , 2014, USENIX Security Symposium.
[20] Johannes Kinder. Towards Static Analysis of Virtualization-Obfuscated Binaries , 2012, 2012 19th Working Conference on Reverse Engineering.
[21] Christopher Krügel,et al. BareCloud: Bare-metal Analysis-based Evasive Malware Detection , 2014, USENIX Security Symposium.
[22] Christopher Krügel,et al. BareBox: efficient malware analysis on bare-metal , 2011, ACSAC '11.
[23] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[24] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[25] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[26] Adrian Perrig,et al. Towards Sound Detection of Virtual Machines , 2008, Botnet Detection.
[27] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[28] Kevin Coogan,et al. Deobfuscation of virtualization-obfuscated software: a semantics-based approach , 2011, CCS '11.
[29] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[30] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[31] Lorenzo Martignoni,et al. Testing CPU emulators , 2009, ISSTA.
[32] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
[33] Kevin Borders,et al. Virtual Machine Security Systems , 2006 .