최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회지 = Communications of the Korean Institute of Information Scientists and Engineers, v.28 no.11, 2010년, pp.117 - 126
초록이 없습니다.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
AVTEST, AV-Test.org
Anubis, anubis.iseclab.org
CWSandbox, www.sunbeltsandbox.com
Norman Sandbox, www.norman.com/technology/norman_sandbox/
BitBlaze, bitblaze.cs.berkeley.edu
CVE-2009-4324 PDF Communist China remove missiles from Qiying526@ntu.edu.tw, contagiodump.blogspot.com
Joedoc, www.joedoc.org
VMUnpacker, http://sucop.com/
Generic Unpacker, www.exetools.com/unpackers.htm
Prices of Russian crimeware, http://evilfingers.blogspot.com/2009/03/russian-prices-of-crimware.html
Prices of Russian crimeware. Part 2, http://evilfingers.blogspot.com/2009/08/prices-of-russian-crimeware-part-2.html
ZeuEsta: ZeuS cybercrime hosting with SPack, http://www.abuse.ch/?p1662
ZeuS and power Botnet zombie recruitment, http://evilfingers.blogspot.com/2009/10/zeus-and-power-botnet-zombie.html
Symantec Global Internet Security Threat Report Trends for 2008, http://www.symantec.com/connect/downloads/symantec-global-internet-security-threat-report-trends-200, 2009
TrendMicro The Real Face of KOOBFACE : The Largest Web 2.0 Botnet Explained, http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/the_real_face_of_koobface_jul2009.pdf, 2009
Dwan Dong, Bavid Brumley, BitBlaze : A New Approach to Computer Security via Binary Analysis, ICISS 2008, pp.1-25, 2008
Anh M. Nguyen, Nabil Schear, MAVMM : Leightweight and Purpose Built VMM Malware Analysis, Computer Security Applications Conference 2009, pp 441.450, 2009
Zhiqiang Lin,p Xiangyu Zhang, Automatic Reverse Engineering of Data Structures from Binary Execution, NDSS 2010, 2010
Kelly Jackson Higgins, Senior Editor, Dark Reading, "The World's Biggest Botnets", http://www.darkreading.com/document.asp?doc_id138610&WT.svlnews1_1
Yi-Min Wang, Doug Beck, Xuxian Jiang, and Roussi Roussev, "Automated Web Patrol with Strider Honey-Monkeys: Finding Web Sites That Exploit Browser Vulnerabilities", NDSS(ANNUAL SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY)06, August 2006
Radek Hes, Peter Komisarczuk, Ramon Steenson, Christian Seifert, "The Capture-HPC client architecture", 2009, http://ecs.victoria.ac.nz/twiki/pub/Main/TechnicalReportSeries/ECSTR09-11.pdf
Ali Ikinci, Thorsten Holz, Felix Freiling, "Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients", Proceedings of Sicherheit 2008, April, 2008
※ AI-Helper는 부적절한 답변을 할 수 있습니다.