Browse > Article

가상환경을 이용한 악성코드 탐지기술  

Seo, Jung-Taek (한국전자통신연구원 부설 연구소)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 F.Apap, A. Honnig, S.Hershkop, E.Eskin, and S.Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses. Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002), 2002
2 Carsten Willems, Thorsten Holz, and Felix Freiling, : Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy. 2007
3 Norman Sandbox, http://www.norman.com/Product/Sandbox-products/en
4 TTAnalyze, http://fabrice.bellard.free.fr/qemu/
5 TTAnalyze, http://www.ikarus.at/
6 CWSandbox, http://www.cwsandbox.org
7 Apap, F., Honkg, A., Hershkop, S., Eskin, E., Stolfo, S.J : Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection(RAID). 2002
8 Carl Endorf, Eugene Schultz, Jim Mellander, 'Intrusion Detection & Prevention', McGraw-Hill, 2004
9 Rebecca Bacel and Peter Mell, 'Intrusion Detection Systems', NIST, 2003
10 H. Debar, M. Dacie, and A. Wepsi, 'A Revised Taxonomy for Intrusion- Detection Systems', IBM Report, 1999
11 TTAnalyze, http://www.tuwien.ac.at/
12 Sunbelt CWSandbox, http://www.sunbelt-software.com/Developer/Sunbelt-CWSandbox/
13 Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo. An Email Worm Vaccine Architecture. Proceeding of the First Information Security Practice and Experience( ISPEC 2005), 2005