최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지 = Journal of KIISE, v.41 no.10, 2014년, pp.859 - 869
이성호 (한국과학기술원 전산학과) , 한태숙 (한국과학기술원 전산학과)
In recent years, the obfuscation techniques are commonly exploited to protect malwares, so obfuscated malwares have become a big threat. Especially, it is extremely hard to analyze virtualization-obfuscated malwares based on unusual virtual machines, because the original program is hidden by the vir...
DigiCAP, Codejam service [Online]. Available: http://www.codejam.or.kr/.
SafeNet, Sentinel envelope [Online]. Available: http://www.safenet-inc.com/software-momentization/sentinel-envelope/.
Kindsight, Kindsight security labs malware report-Q3 2013 [Online]. Available: http://www.kindsight.net/sites/default/_les/Kindsight-Q3-2013-Malware-Report-_nal.pdf
M. Dalla Preda, M. Christodorescu, S. Jha, S. Debray, "A Semantics-Based Approach to Malware Detection," Proc. of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'07), pp. 377-388, Jan. 2007.
E. Kirda, C. Kruegel, "Behavior-based Spyware Detection," Proc. of the 15th conference on USENIX Security Symposium, pp. 273-288, Jul. 2006.
VMProtect software, VMProtect [Online]. Available: http://vmpsoft.com/.
Oreans, Code Virtualizer [Online]. Available: http://www.oreans.com/codevirtualizer.php
K. Coogan, G. Lu, S. Debray, "Deobfuscation of Virtualization-Obfuscated Software," Proc. of the 18th ACM Conference on Computer and Communications Security (CCS'11), Oct. 2011.
J. Raber, "Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort," Proc. of the 16th Black Hat USA, Jul. 2013.
R. Rolles, "Unpacking Virtualization Obfuscators," Proc. of the 3rd USENIX conference on Offensive technologies (WOOT'09), Aug. 2009.
M. Sharif, A. Lanzi, J. Giffin, W. Lee, "Automatic Reverse Engineering of Malware Emulators," Proc. of the 30th IEEE Symposium on Security & Privacy (S&P'09), May 2009.
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallance, V. J. Reddi, K. Hazelwood, "Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation," Proc. of the 2005 ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI' 05), pp. 190-200, Jun. 2005.
N. Nethercote, J. Seward, "Valgrind: a framework for heavyweight dynamic binary instrumentation," Proc. of the 2007 ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI' 07), pp. 89-100, Jun. 2007.
D. Bruening, E. Duesterwald, S. Amarasinghe, "Design and Implementation of a Dynamic Optimization Framework for Windows," Proc. of the 4th ACM Workshop on Feedback-Directed and Dynamic Optimization (FDDO-4), Dec. 2001.
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallance, V. J. Reddi, K. Hazelwood, "Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation," Proc. of the 2005 ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI' 05), pp. 190- 200, Jun. 2005.
D. Brumley, I. Jager, T. Avgerinos, E. J. Schwartz, "BAP: a binary analysis platform," Proc. of the 23rd International Conference on Computer Aided Verification (CAV' 11), pp. 463-469, Jul. 2011.
G. Dabah, Powerful Disassembler Library for AMD64 [Online]. Available: http://www.ragestorm.net/distorm/.
Graphviz, Graphviz - Graph Visualization Software [Online]. Available: http://www.graphviz.org/.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.