Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes
暂无分享,去创建一个
[1] Dan Farmer,et al. Forensic Discovery , 2004 .
[2] Matt Bishop,et al. Virtual Machine Introspection: Observation or Interference? , 2008, IEEE Security & Privacy.
[3] Stephanie Forrest,et al. The Evolution of System-Call Monitoring , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[4] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[5] Xuxian Jiang,et al. Multi-aspect profiling of kernel rootkit behavior , 2009, EuroSys '09.
[6] Zhenkai Liang,et al. HookFinder: Identifying and Understanding Malware Hooking Behaviors , 2008, NDSS.
[7] Claudio Carpineto,et al. A Survey of Automatic Query Expansion in Information Retrieval , 2012, CSUR.
[8] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[9] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[10] W. Alink,et al. Forensic memory analysis: Files mapped in memory , 2008, Digit. Investig..
[11] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[12] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[13] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[14] Ahmed Patel,et al. Finite state machine approach to digital event reconstruction , 2004, Digit. Investig..
[15] Dongyan Xu,et al. Characterizing kernel malware behavior with kernel data access patterns , 2011, ASIACCS '11.
[16] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[17] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[18] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Brendan Dolan-Gavitt,et al. The VAD tree: A process-eye view of physical memory , 2007, Digit. Investig..
[20] Chen-Ching Liu,et al. Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract) , 2012, RAID.
[21] Amit Vasudevan,et al. Cobra: fine-grained malware analysis using stealth localized-executions , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[22] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[23] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[24] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[25] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[26] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[27] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[28] Joshua James,et al. A Novel Methodology for Malware Intrusion Attack Path Reconstruction , 2011, ICDF2C.
[29] Chen-Ching Liu,et al. Evasion-resistant malware signature based on profiling kernel data structure objects , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[30] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[31] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[32] Abhinav Srivastava,et al. Robust signatures for kernel data structures , 2009, CCS.
[33] Ibrahim M. Baggili,et al. Computer Profiling for Preliminary Forensic Examination , 2013, ICDF2C.
[34] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[35] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[36] Eoghan Casey,et al. Malware Forensics: Investigating and Analyzing Malicious Code , 2008 .
[37] Stephan Merz,et al. Model Checking , 2000 .
[38] George M. Mohay,et al. A Model for Computer Profiling , 2010, 2010 International Conference on Availability, Reliability and Security.