1 |
GuHyeon Jeong, Euijin Choo, Joosuk Lee and Heejo Lee, "Generic Unpacking Using Entropy Analysis", JKIIT, Vol.7, No.2, pp.232-238, Feb 2009
|
2 |
Daniel A. Quist and Lorie M. Liebrock. Reversing compiled executables for malware analysis via visualization, Information Visualization. 10(2), April 2011. (doi:10.1057/ivs.2010.11)
|
3 |
YH Lee, MH Jeong, HC Jeong, TS Son, JS Moon "A Study on Generic Unpacking using Entropy Variation Analysis", JKIIT, Vol.22, No.2, pp. 179-188, April 2012
|
4 |
Kullback, S. "Letter to the Editor: The Kullback-Leibler distance". The American Statistician 41 (4): 340?341. JSTOR 2684769. 1987
|
5 |
information gain http://en.wikipedia.org/wiki/Information_gain_in_decision_trees
|
6 |
pintool http://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool
|
7 |
Visual C++ 10, http://www.microsoft.com
|
8 |
AV-Test. http://www.av-test.org
|
9 |
Ho Young Whang, Hyoung Joong Kim, "Reversible Watermarking for Audio Using Recompression Met hod", Journal of Digital Contents Society, vol. 14, no. 2, pp. 199-206, Jun. 2013
DOI
ScienceOn
|
10 |
Robert Lyda and James Hamrock, "Using entropy analysis to find encrypted and packed malware", Security & Privacy IEEE, vol. 5, no. 2, pp. 40-45, Mar. 2007
|
11 |
Min Gyung Kang, Pongsin Poosankam, and Heng Yin. "Renovo: A Hidden Code Extractor for Packed Executables," In Proceedings of the 5th ACM Work shop on Recurring Malcode (WORM"07), pp 46-53. Nov. 2007
|
12 |
C.E. Shannon and W. Weaver, The Mathematical Theoryof Communication, Univ. of Illinois Press, 1963
|