1 |
AV-TEST - The Independent IT-Security Institute, www.av-test.org
|
2 |
K. Thomas, and D.M. Nicol, "The Koobface Botnet and The Rice of Social Malware," IEEE Int. Conf. Malicious and Unwanted Software (Malware'10), pp. 63-70, Oct. 2010.
|
3 |
Boo Joong Kang, Kyoung Soo Han, Eul Gyu Im, "Malware Current Status and Detection Technology," Communications of the Korea Information Science Society, vol. 30, no. 1, pp. 44-53, Jan. 2012.
|
4 |
Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2B: Instruction Set Reference, N-Z, Intel Corporation, March 2010.
|
5 |
A. Moser, C. Kruegel, and E. Kirda, "Limits of Static Analysis for Malware Detection," In ACSAC, pp. 421-430, Dec. 2007.
|
6 |
JooBeom Yun, YoungJoo Shin, "MiGuard : Detecting and Guarding against Malicious Iframe through API Hooking," IEICE Electronics Express, pp. 460-465, 2011.
|
7 |
G. Jacob. H. Debar, and E. Filiol, "Behavioral Detection of Malware: from a Survey towards an established Taxonomy," Journal in Computer Virology, vol. 4, no. 3, pp. 251-266, 2008.
DOI
ScienceOn
|
8 |
Dwan Dong, Bavid Brumley, BitBlaze, "A New Approach to Computer Security via Binary Analysis," ICISS 2008, pp. 1-25, 2008.
|
9 |
Zhiqiang Lin, Xiangyu Zhang, "Automatic Reverse Engineering of Data Structures form Binary Execution," NDSS 2010, 2010.
|
10 |
Symantec Corporation, "Symantec Global Internet Security Threat Report," Apr. 2010.
|