Secure and advanced unpacking using computer emulation
暂无分享,去创建一个
[1] Jens Tröger,et al. Specification-driven dynamic binary translation , 2005 .
[2] Mark Russinovich,et al. Inside Microsoft Windows 2000 , 2000 .
[3] Joanna Rutkowska. Detecting Windows Server Compromises with Patchfinder 2 , 2004 .
[4] Péter Ször. MEMORY SCANNING UNDER WINDOWS NT , 1999 .
[5] Eric Filiol,et al. Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the Bradley Virus 1 , 2004 .
[6] Eric Filiol,et al. A statistical model for undecidable viral detection , 2007, Journal in Computer Virology.
[7] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[8] S. Katzenbeisser,et al. Malware Normalization , 2005 .
[9] Mark Russinovich,et al. Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer) , 2004 .
[10] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[11] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[12] Mark Russinovich,et al. Microsoft Windows Internals : Microsoft Windows Server 2003, Windows XP, and Windows 2000 , 2005 .
[13] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[14] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[16] Greg Hoglund,et al. Rootkits: Subverting the Windows Kernel , 2005 .
[17] Sébastien Josse,et al. How to Assess the Effectiveness of your Anti-virus? , 2006, Journal in Computer Virology.
[18] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[19] Georgios Portokalidis,et al. ZERO HOUR WORM DETECTION AND CONTAINMENT USING HONEYPOTS , 2004 .
[20] Gary Nebbett. Windows NT/2000 Native API Reference , 2000 .
[21] Eric Filiol,et al. On the possibility of practically obfuscating programs towards a unified perspective of code protection , 2007, Journal in Computer Virology.
[22] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[23] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .