온라인게임핵, 그리고 그들의 생존 전략

A Study of Onlinegamehack, Survival Strategies in the Wild

  • 발행 : 2013.07.15

초록

키워드

참고문헌

  1. 유동영, 서동남, 김휘강, 최진영, "온라인게임 서비스분야에 정보보호 사전진단 적용시 효과성에 관한 연구", 한국IT서비스학회지, 제10권, 제2호, pp.293-308, 2011
  2. 최화재, 우지영, 김휘강, "온라인게임 계정도용 탐지모델에 관한 연구", 한국게임학회 논문지, Vol. 11, No. 6, pp.81-93, 2011
  3. Brett Moore, "Win32 Shatter Attacks", Black Hat USA, 2004
  4. Wayne Low, "Code Injection via ROP", Virus Bulletin Oct, 2012
  5. Royal P., Halpin M., Dagon D., Edmonds R., Wenke Lee, "PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware", Computer Security Applications Conference ACSAC, 2006
  6. Min Gyung Kang, Pongsin Poosankam, Heng Yin, "Renovo: a hidden code extractor for packed executables", WORM '07 Proceedings of the ACM workshop on Recurring malcode, pp.46-53, 2007
  7. Guhyeon Jeong, Euijin Choo, Joosuk Lee, Bat-Erdene, M., Heejo Lee "Generic unpacking using entropy analysis", Malicious and Unwanted Software on 5th International Conference, pp.98-105, 2010
  8. Jusuk Lee, Kyoochang Jeong, Heejo Lee, "Detecting metamorphic malwares using code graphs", SAC '10 Proceedings of the 2010 ACM Symposium on Applied Computing, pp.1970-1977
  9. wj32, "12 ways to terminate a process", http://wj32.org/wp/2009/05/10/12-ways-to-terminate-a-process/, 2009
  10. Greg Hoglund, James Butler, "Rootkits: Subverting the Windows kernel", Addison-Wesley, 2006
  11. Peter Kleissner, "Stoned Bootkit", Black Hat Europe, 2007