Browse > Article

Malicious Code Trends and Detection Technologies  

Kong, Boo-Joong (한양대학교)
Han, Kyoung-Soo (한양대학교)
Im, Eul-Gyu (한양대학교)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2B: Instruction Set Reference, N-Z, Intel Corporation, March 2010.
2 서정택, 가상환경을 이용한 악성코드 탐지기술, 정보보호학회지, 제17권, 제4호, pp.74-82, August 2007.
3 김성우, 해캥/파괴의 광학(개정판), 와이미디어, 2006.
4 Trinius, P., Holz, T., Gobel, J. and Freiling, F. C., Visual Analysis of Mal ware Behavior using Treemaps and Thread Graphs, In International Workshop on Visualization for Cyber Security(VizSec), pp.33-38, 2009.
5 Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X., Synthesizing Near-optimal Malware Specifications from Suspicious Behaviors, In Proc. of the 2010 IEEE Symp. on Security and Privacy, pp.45-60, 2010.
6 Xuxian Jiang, Dongyan Xu, Profiling Self-propagating Worms via Behavioral Footprinting, Proceedings of the 4th ACM Workshop on Recurring Malcode, November 2006.
7 S. Cesare and Y. Xiang, A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, pp.721-728, April 2010.
8 Q. Zhang, and D. S. Reeves, MetaAware: Identifying Metamorphic Malware, Proceedings of the 23rd Annual Computer Security Applications Conference, pp.411- 420, September 2007.
9 R. Tian, L.M. Batten and S.C. Versteeg, Function Length as a Tool for Malware Classification, Proceedings of the 3rd International Conference on Malicious and Unwanted Software, pp.69-76, October 2008.
10 J. Lee, K. Jeong and H. Lee, Detecting Metamorphic Malwares using Code Graphs, Proceedings of the 2010 ACM Symposium on Applied Computing, pp.1970-1977, March 2010.
11 D. K. S. Reddy and A. K. Pujari, N-gram Analysis for Computer Virus Detection, Journal in Computer Virology, 2(3), pp.231-269, November 2006.   DOI