Study of Technical Trends and Analysis Method of Recent Malware

최신 악성코드 기술동향 및 분석 방안 연구

  • Published : 2010.11.30

Abstract

Keywords

References

  1. AVTEST, AV-Test.org
  2. Anubis, anubis.iseclab.org
  3. CWSandbox, www.sunbeltsandbox.com
  4. Norman Sandbox, www.norman.com/technology/norman_sandbox/
  5. BitBlaze, bitblaze.cs.berkeley.edu
  6. CVE-2009-4324 PDF Communist China remove missiles from Qiying526@ntu.edu.tw, contagiodump.blogspot.com
  7. Joedoc, www.joedoc.org
  8. VMUnpacker, http://sucop.com/
  9. Generic Unpacker, www.exetools.com/unpackers.htm
  10. Prices of Russian crimeware, http://evilfingers.blogspot.com/2009/03/russian-prices-of-crimware.html
  11. Prices of Russian crimeware. Part 2, http://evilfingers.blogspot.com/2009/08/prices-of-russian-crimeware-part-2.html
  12. ZeuEsta: ZeuS cybercrime hosting with SPack, http://www.abuse.ch/?p=1662
  13. ZeuS and power Botnet zombie recruitment, http://evilfingers.blogspot.com/2009/10/zeus-and-power-botnet-zombie.html
  14. Symantec Global Internet Security Threat Report Trends for 2008, http://www.symantec.com/connect/downloads/symantec-global-internet-security-threat-report-trends-200, 2009
  15. TrendMicro The Real Face of KOOBFACE : The Largest Web 2.0 Botnet Explained, http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/the_real_face_of_koobface_jul2009.pdf, 2009
  16. Dwan Dong, Bavid Brumley, BitBlaze : A New Approach to Computer Security via Binary Analysis, ICISS 2008, pp.1-25, 2008
  17. Anh M. Nguyen, Nabil Schear, MAVMM : Leightweight and Purpose Built VMM Malware Analysis, Computer Security Applications Conference 2009, pp 441.450, 2009
  18. Zhiqiang Lin,p Xiangyu Zhang, Automatic Reverse Engineering of Data Structures from Binary Execution, NDSS 2010, 2010
  19. Kelly Jackson Higgins, Senior Editor, Dark Reading, "The World's Biggest Botnets", http://www.darkreading.com/document.asp?doc_id=138610&WT.svl=news1_1
  20. Yi-Min Wang, Doug Beck, Xuxian Jiang, and Roussi Roussev, "Automated Web Patrol with Strider Honey-Monkeys: Finding Web Sites That Exploit Browser Vulnerabilities", NDSS(ANNUAL SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY)06, August 2006
  21. Radek Hes, Peter Komisarczuk, Ramon Steenson, Christian Seifert, "The Capture-HPC client architecture", 2009, http://ecs.victoria.ac.nz/twiki/pub/Main/TechnicalReportSeries/ECSTR09-11.pdf
  22. Ali Ikinci, Thorsten Holz, Felix Freiling, "Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients", Proceedings of Sicherheit 2008, April, 2008