최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보통신 : 한국통신학회지 = The journal of the Korean Institute of Communication Sciences, v.23 no.9, 2006년, pp.75 - 87
전용희 (대구가톨릭대학교) , 장정숙 (대구가톨릭대학교) , 장종수 (한국전자통신연구원) , 남택용 (한국전자통신연구원)
초록이 없습니다.
K2, ADMmutate, http://www.ktwo.ca/security.html.
David J. Albanese, Michael J. Wiacek, Christopher M. Salter, and Jeffrey A. Six, The Case for Using Layered Defenses to Stop Worms, Report #C43-002R-2004, Version 1.0, June 18, 2004, National Security Agency
O. Kolesnikov, D. Dagon, and W. Lee, 'Advanced Polymorphic Worms : Evading IDS by blending in with normal traffic', College of Computing, Georgia Inst. of Tech, Atlanta, GA. 2004
CLET Team, 'Polymorphic Shellcode Engine Using Spectrum Analysis', http://www.phrack.org, Phrack 61/9, 2003
M. Sedalo, Jempiscodes: Polymorphic shellcode generator, 2003. http:// securitylab.ru/tools/services/download/?ID36712
Tapion Project, http://pb.specialised.info/all/tapion/
J. Newsome, B. Karp, and D. Song. Polygraph: Automatic signature generation for polymorphic worms. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005
Y. Tang and S. Chen. Defending against Internet worms: A signature-based approach. In Proceedings of the IEEE Infocom 2005, Miami, Florida, USA, May 2005
S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm fingerprinting. In Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, San Francisco, SA, USA, December 2004
Mihai Christodorescu et al., 'Semantics-Aware Malware Detection'. (U of Wisconsin & CMU)
C.Kruegel, E.Kirda, D.Mutz, W.Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID), September 2005
A. Pasupulati et al., 'Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities', In 9th IEEE/IFIP Network Operation and Management Symposium (NOMS' 2004)
U. Payer, P. Teufl, and M. Lamberger, 'Hybrid engine for polymorphic shellcode detection', In Proc. of DIMVA, 2005
Ed Skoudis and Lenny Zeltser, Malware: Fighting Malicious Code, Prentice-Hall, 2004, (Chapter 2: Virus, 3: Worm)
V. Yegneswaran, J. T. Giffin, P. Barford, and S. Jha, 'An architecture for generating semantics-aware signature', In USENIX Security Symposium, 2005
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.