Malicious Code Trends and Detection Technologies

악성코드 현황 및 탐지 기술

  • Published : 2012.01.18

Abstract

Keywords

Acknowledgement

Supported by : 한국연구재단

References

  1. Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2B: Instruction Set Reference, N-Z, Intel Corporation, March 2010.
  2. 서정택, 가상환경을 이용한 악성코드 탐지기술, 정보보호학회지, 제17권, 제4호, pp.74-82, August 2007.
  3. 김성우, 해캥/파괴의 광학(개정판), 와이미디어, 2006.
  4. Trinius, P., Holz, T., Gobel, J. and Freiling, F. C., Visual Analysis of Mal ware Behavior using Treemaps and Thread Graphs, In International Workshop on Visualization for Cyber Security(VizSec), pp.33-38, 2009.
  5. Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X., Synthesizing Near-optimal Malware Specifications from Suspicious Behaviors, In Proc. of the 2010 IEEE Symp. on Security and Privacy, pp.45-60, 2010.
  6. Xuxian Jiang, Dongyan Xu, Profiling Self-propagating Worms via Behavioral Footprinting, Proceedings of the 4th ACM Workshop on Recurring Malcode, November 2006.
  7. S. Cesare and Y. Xiang, A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, pp.721-728, April 2010.
  8. Q. Zhang, and D. S. Reeves, MetaAware: Identifying Metamorphic Malware, Proceedings of the 23rd Annual Computer Security Applications Conference, pp.411- 420, September 2007.
  9. R. Tian, L.M. Batten and S.C. Versteeg, Function Length as a Tool for Malware Classification, Proceedings of the 3rd International Conference on Malicious and Unwanted Software, pp.69-76, October 2008.
  10. J. Lee, K. Jeong and H. Lee, Detecting Metamorphic Malwares using Code Graphs, Proceedings of the 2010 ACM Symposium on Applied Computing, pp.1970-1977, March 2010.
  11. D. K. S. Reddy and A. K. Pujari, N-gram Analysis for Computer Virus Detection, Journal in Computer Virology, 2(3), pp.231-269, November 2006. https://doi.org/10.1007/s11416-006-0027-8