1 |
Intel((R)) 64 and IA-32 Architectures Software Developer Manuals, http://www.intel.com/products/processor/ manuals/
|
2 |
W Feng, E Kaiser and T Schluessler, "Stealth measurements for cheat detection in on-line games," System Support for Games, ACM, 2008
|
3 |
Themida, http://www.oreans.com/themida.php
|
4 |
UPX, http://upx.sourceforge.net/
|
5 |
강병탁, "바이러스 감지 회피의 원리", 마이크로소프트웨어 http://www.imaso.co.kr/?doc=bbs/gnuboard.php& bo_table=article&wr_id=34506
|
6 |
PortTalk, http://www.ce.rit.edu/studentresources/reference_materials/759/port/porttalk.pdf
|
7 |
VB winIO simulate keyboard key test program, http://www.bvbcode.com/code/jyus4x76
|
8 |
유동영, 서동남, 김휘강, 최진영, "온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구", 한국IT서비스학회지, 제10권, 제2호, pp. 293-308
|
9 |
T Barik, B Harrison, DL Roberts and X Jiang, "Spatial Game Signatures for Bot Detection in Social Games,"Eighth Artificial Intelligence, 2012
|
10 |
S Mitterhofer, C Kruegel and E Kirda, "Server-Side Bot Detection in Massive Multiplayer Online Games," Security & Privacy, 2009
|
11 |
DLL Injection and Hooking, http://securityxploded.com/dll-injection-and-hooking.php
|
12 |
distorm, http://ragestorm.net/distorm/
|
13 |
Endianness, http://en.wikipedia.org/wiki/Endianness
|