Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
暂无分享,去创建一个
Christopher Krügel | Engin Kirda | Thorsten Holz | Clemens Kolbitsch | Thorsten Holz | Christopher Krügel | E. Kirda | Clemens Kolbitsch
[1] Xiangyu Zhang,et al. Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[2] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[3] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[4] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[5] David Brumley,et al. Replayer: automatic protocol replay by binary analysis , 2006, CCS '06.
[6] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[7] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[8] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[9] Nathaniel S. Borenstein,et al. Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types , 1996, RFC.
[10] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[11] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[12] Felix C. Freiling,et al. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms , 2009, USENIX Security Symposium.
[13] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[14] Hassen Saïdi,et al. A Foray into Conficker's Logic and Rendezvous Points , 2009, LEET.
[15] Felix C. Freiling,et al. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones , 2009, ESORICS.
[16] Xiangyu Zhang,et al. Precise dynamic slicing algorithms , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[17] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[18] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[19] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[20] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[21] Nathaniel S. Borenstein,et al. Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies , 1996, RFC.
[22] Zhenkai Liang,et al. One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments , 2005, NDSS.
[23] Geoff Hulten,et al. Spamming botnets: signatures and characteristics , 2008, SIGCOMM '08.
[24] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[25] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[26] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[27] Arvind Krishnamurthy,et al. Studying Spamming Botnets Using Botlab , 2009, NSDI.
[28] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[29] Bennet S. Yee,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[30] Stephen McCamant,et al. Binary Code Extraction and Interface Identification for Security Applications , 2009, NDSS.
[31] Stephen McCamant,et al. Evaluating SFI for a CISC Architecture , 2006, USENIX Security Symposium.
[32] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[33] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[34] Gregory R. Andrews,et al. Binary Obfuscation Using Signals , 2007, USENIX Security Symposium.
[35] Zhi Wang,et al. ReFormat: Automatic Reverse Engineering of Encrypted Messages , 2009, ESORICS.
[36] Dawn Xiaodong Song,et al. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering , 2009, CCS.
[37] Chris Kanich,et al. On the Spam Campaign Trail , 2008, LEET.
[38] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[39] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.