A Tool for Signature-Based Identification of Safe Open-Source Functions Toward Efficient Malware Analysis |
Lee, Seoksu
(Chungnam National University)
Yang, Jonghwan (Chungnam National University) Jung, Woosik (Chungnam National University) Kim, Yeongcheol (Chungnam National University) Cho, Eun-Sun (Chungnam National University) |
1 | Xin Hu, Tzi-cker Chiudo, Kang G. Shin, "Large-Scale Malware Indexing Using Function-Call Graphs", ACM CCS 2009 |
2 | Bindiff, https://www.zynamics.com/bindiff.html |
3 | IDA,https://www.hex-rays.com/products/ida |
4 | OpenSSL, https://www.openssl.org/ |
5 | IDA F.L.I.R.T. Technology: In-Depth https://www.hex-rays.com/products/ida/tech/FLIRT/in_depth.shtml |
6 | Zlib, http://www.zlib.net/ |
7 | Crypto++, https://www.cryptopp.com/ |
8 | Zlib, https://ko.wikipedia.org/wiki/Zlib |
9 | Woo Hyun Ahn, Hyungsu Kim. "Attacking OpenSSL Shared Library Using Code Injection". Journal of KIISE : Computer System and Theory. 37(4), pp. 226-238, Aug. 2010 |
10 | JeongHyeok Park, YongSuk Choi, JongMoo Choi, "Software Similarity Analysis via Stack Usage Pattern". Journal of KIISE : Computing Practices and Letters, 20(6), pp. 349-353, June. 2014 |
11 | HyeyuKwon, "Strengthen the security of applications by using the open source security framework", Proc. of the KIISE Korea Computer Congress, pp. 1104-1106 June. 2016 |
12 | Yeongcheol Kim, Eun-Sun Cho, "Similarity Analysis on Different Versions of Same Functions", Proc. of the KIISE Korea Computer Congress, pp. 760-762, Dec. 2016 |
13 | Yongsuk Choi, Jongmoo Choi, "Binary based Software Similarity Analysis Tool". KIISE : Communioations of the Korean Institute of Information Scientistes and Engineers. 34(1), pp. 37-44, Jan. 2016 |
14 | IDA api, https://www.hex-rays.com/products/ida/support/idapython_docs/ |
15 | MongoDB, https://www.mongodb.com/ |