A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail |
Yang, Kyeong-Cheol
(Information Management and Security CIST, Korea University)
Lee, Su-Yeon (Information Management and Security CIST, Korea University) Park, Won-Hyung (Information Security, Kyonggi University) Park, Kwang-Cheol (Information Management and Security CIST, Korea University) Lim, Jong-In (Information Management and Security CIST, Korea University) |
1 | 서해지방경찰청, "E-메일 해킹관련 조치사항," http://wh.kcg.go.kr |
2 | Didier Stevens, XORSearch Tool, http://blog.didierstevens.com/programs/xorsearch/ |
3 | 국가사이버안전센터, "Monthly Cyber Security," pp. 28-38. 2008년 4월 |
4 | Microsoft Corporation, "Bitwise Exclusive OR Operator," http://msdn. microsoft.com/fr-fr/library/3akey979.aspx |
5 | J. Beale, Snort 2.0 Intrusion Detection, 2th Ed., Syngress Media Inc., May 2004 |
6 | Ahnlab, "알려지지 않은 악성코드 탐지 기법," http://kr.ahnlab.com/securityinfo/infoView.ahn? seq=9532&category=01 |