참고문헌
- Nwokedi Idika and Aditya P. Mathur, A Survey of Malware Detection Techniques, Department of Computer Science, Purdue University, Feb. 2007
- Michael Bailey et al., "Automated Classification and Analysis of Internet Malware", RAID 2007, pp.178-197, 2007
- Barford P., Yagneswaran, V., "An inside look at botnets", Advances in Information Security, Springer, Heidelberg, 2006
- Microsoft, Microsoft security intelligence report, Oct. 2006. http://www.microsoft.com/technet/security/default. mspx
- Joanna Rutkowska, Introducing Stealth Malware Taxonomy, COSEINC Advanced Malware Labs, Nov. 2006, Ver. 1.01
- M. Christodorescu and S. Jha, Testing malware detectors, In Proceedings of International Symposium on Software Testing and Analysis, July 2004
- G. McGraw and G. Morrisett, Attacking malicious code:A report to the infosec research council, IEEE Software, 17(5):33-44, 2000
- A. Vasudevan and R. Yerraballi, Spike:Engineering malware analysis tools using unobtrusive binaryinstrumentation. In Proceedings of the 29th Australasian Computer Science Coference, pp.311-320, 2006
- Newsome, J., Karp, B., Song, D., "Polygraph: Automatically generating signatures for polymorphic worms", In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May, 2005
- Li, Z. et al., "Hasma:Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience", In Proceedings of IEEE Symposium on Security and Privacy, 2006
- Moshchuk, A. et al., "A Crawler-based Study of Spyware in the Web", In Proceedings of the Network and Distributed System Security Symposium( NDSS), San Diego, CA, 2006
- Ellis D., et al, "A Behavioral Approach to Worm Detection", In Proceedings of the ACM Workshop on Rapid Malcode (WORM04), October 2004, ACM Press, New York, 2004
- Kolter, J.Z. and Maloof, M.A., "Learning to Detect and Classify Malicious Executables in the Wild", Journal of Machine Learning Research, 2007
- Hastie, T. et al., "The Elements of Statistical Learning", Data Mining, Inference, and Prediction, Springer, Heidelberg, 2001
- K. Wang and S. J. Stolfo, "Anomalous payload- based network intrusion detection", In Proceedings of the 7th International Symposium on (RAID), pp. 201-222, Sep. 2004
- W. Lee and S. Stolfo, "Data mining approaches for intrusion detection", In Proceedings of the 7th USENIX Security Symposium, 1998
- M. Boldt and B. Carlsson, "Analyzing privacyinvasive software using computer forensic methods", http://www.e-evidence.info/b.html, Jan. 2006
- R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati, "A fast automation-based approach for detecting anomalous program behaviors", In IEEE Symposium on Security and Privacy, 2001
- S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls", Journal of Computer Security, pp. 151-180, 1998
- W. Li, K. Wang, S. Stolfo, and B. Herzog, "Fileprints:Identifying file types by n-gram analysis", 6th IEEE Information Assurance Workshop, June 2005
- Y. M. Wang, D. Beck, B. Vo, R. Roussev, and C. Verbowski, "Detecting stealth software with strider ghostbuster", In Proceedings of the 2005 International Conference on Defendable Systems and Networks, pp. 368-377, 2005
- S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination", In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, May 1994
- W. Masri and A. Podgurski, "Using dynamic information flow analysis to detect attacks against applications", In Proceedings of the 2005 Workshop on Software Engineering for secure systems- Building Trustworthy Applications, May 2005
- J. Xiong, "Act:Attachment chain tracing scheme for email virus detection and control", In Proceedings of the ACM Workshop on Rapid Malcode(WORM)", 2004
- C. Ko, G. Fink, and K. Levitt, "Automated detection of vulnerabilities in privileged programs by execution monitoring", In Proceedings of the 10th Annual Computer Security Applications Conference, pp.134-144, Dec. 1994
- R. Sekar, T. Bowen, and M. Segal, "On preventing intrusions by process behavior monitoring", USENIX Intrusion Detection Workshop, 1999
- R. B. Lee, D. K. Karig, P. McGregor, and Z. Shi, "Enlisting hardware architecture to thwart malicious code injection", International Conference on Security in Pervasive Computing (SPC), 2003
- E. Kirda, C. Kruegel, G. Vigna, and N. Jovanovic, "Noxes:A client-side solution for mitigating cross-site scripting attacks", In the 21st ACM Symposium on Applied Computing (SAC), 2006
- G. E. Suh, J. Lee, and S. Devadas, "Secure program execution via dynamic information flow tracking", International Conf. Architectural Support for Programming Languages and Operating Systems, 2004
- M. Milenkovic, A. Milenkovic, and E. Jovanov, "Using instruction block signatures to counter code injection attacks", ACM SIGARCH Computer Architecture News, 33;108-117, March 2005
- S. E. Schechter, J. Jung, and Berger A. W., "Fast detection of scanning worms infections", In Proceedings of 7th International Symposium on RAID, 2004
- C. M. Linn et al., "Protecting against unexpected system calls", Usenix Security Symposium, 2005
- J. Bergeron, M, Debbabi, J, Desharnis, M.M. Erhioui, and N. Tawbi, "Static detection of malicious code in executable programs", International Journal of Req. Eng., 2001
- J. Bergeron, M, Debbabi, M.M. Erhioui, and B. Ktari, "Static analysis of binary code to isolate malicious behavior", In 8th Workshop on Enabling Technologies:Infrastructure for Collaborative Enterprises, 1999
- M. Debbabi et al., "Secure self-certified cots", In Proceedings of the 9th IEEE International Workshop on Enabling Technologies:Infrastructure for Collaborative Enterprises, pp.183- 188, 2000
- F. Adelstein, M. Stillerman, and D. Kozen, "Malicious code detection for open firmware", In Proceedings of the 18th Annual Computer Security Applications Conference, 2002
- J. Rabek, R. Khazan, S. Lewandowski, and R. Cunningham, "Detection of injected, dynamically generated, and obfuscated malicious code", In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp.76-82, 2003
- D. Wagner and D. Dean, "Intrusion detection via static analysis", IEEE Symposium on Security and Privacy, 2001
- J. T. Giffin, S. Jha, and B. Miller, "Detecting manipulated remote call streams", 11th USENIX Security Symposium, 2002
- W. Halfond and A. orso, "Amnesia:Analysis and monitoring for neutralizing sql-injection attacks", In Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, pp.174-183, 2005
- C. Cowan et al., "Stackguard:Automatic adaptive detection and prevention of buffer-overflow attacks", In Proceedings of the 7th USENIX Security Conference, Jan. 1998
- A. Vasudevan and R. Yerraballi, "Spike: Engineering malware analysis tools using unobtrusive binary-instrumentation", In Proceedings of the 29th Australasian Computer Science Conf., pp.311-320, 2006
- 오진태, 김익균, 장종수, 전용희, "제로-데이 웜 공격 대응을 위한 ZASMIN 시스템 구조", 한국정보보호학회지, 제18권, 제 1호, 81-87쪽, 2008. 2월
- K. Ilgun, R. A. Kemmerer, and Porras P. A., "State transition analysis:A rule-based intrusion detection approach", IEEE Transactions on Software Engineering, 1995
- D. Ellis et al., "A behavioral approach to worn detection", Proceedings of the 2004 ACM Workshop on Rapid Malcode, pp.43-53, 2004
- A. Sung, J. Xu, P. Chavez, and S. Mukkamala, "Static analyzer of vicious executables (save)", In Proceedings of the 20th Annual Computer Security Applications Conf. (ACSAC '04), 00: 326-334, 2004
- M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant, "Semantics-aware malware detection", In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.32-46, 2005
- S. Kumar and Spafford E. H., "A generic virus scanner in c++", In Proceedings of the 8th Computer Security Applications Conference, pp.210-219, 1992
- M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns", USENIX Security Symposium, 2003
- C. Krebich and J. Crowcroft, "Honeycomb-creating intrusion detection signatures using honeypots", In 2nd Workshop on Hot Topics in Network, 2003
- A. Mori, T. Izumida, T. Sawada, and T. Inoue, "A tool for analyzing and detecting malicious mobile code", In Proceedings of the 28th International Conf. on Software Eng. pp.831- 834, 2006
- F. Castaneda, E. C. Sezer, and J. Xu, "Worm vs. worm:preliminary study of an active counter- attack mechanism", Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
- R. W. Lo, K. N. Levitt, and R. A. Olsson, "Mcf :Malicious code filter", Computers and Society, pp.541-566, 1995
- E. Filiol, "Malware pattern scanning schemes secure against black-box analysis", Journal of Computer Virol., 2006