K-Tracer: A System for Extracting Kernel Malware Behavior
暂无分享,去创建一个
[1] Greg Hoglund,et al. Rootkits: Subverting the Windows Kernel , 2005 .
[2] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[3] Robert E. Tarjan,et al. A fast algorithm for finding dominators in a flowgraph , 1979, TOPL.
[4] Daniel Jackson,et al. Chopping: A Generalization of Slicing , 1994 .
[5] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[6] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[8] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[9] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[10] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[11] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[12] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[13] 苗得雨. “引爆”Windows NT , 2001 .
[14] J. Heasman. Implementing and Detecting a PCI Rootkit , 2006 .
[15] Zhi Wang,et al. Countering Persistent Kernel Rootkits through Systematic Hook Discovery , 2008, RAID.
[16] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[17] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[18] Zhenkai Liang,et al. BitScope: Automatically Dissecting Malicious Binaries , 2007 .
[19] Zhenkai Liang,et al. HookFinder: Identifying and Understanding Malware Hooking Behaviors , 2008, NDSS.
[20] Arati Baliga,et al. Lurking in the Shadows: Identifying Systemic Threats to Kernel Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[21] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[22] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[23] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[24] Gary Nebbett. Windows NT/2000 Native API Reference , 2000 .
[25] Roy H. Campbell,et al. Cloaker: Hardware Supported Rootkit Concealment , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[26] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.