Browse > Article

A Study of Onlinegamehack, Survival Strategies in the Wild  

Lee, Jusuk (AhnLab)
Lee, Jinkyung (AhnLab)
Keywords
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 유동영, 서동남, 김휘강, 최진영, "온라인게임 서비스분야에 정보보호 사전진단 적용시 효과성에 관한 연구", 한국IT서비스학회지, 제10권, 제2호, pp.293-308, 2011
2 최화재, 우지영, 김휘강, "온라인게임 계정도용 탐지모델에 관한 연구", 한국게임학회 논문지, Vol. 11, No. 6, pp.81-93, 2011
3 Brett Moore, "Win32 Shatter Attacks", Black Hat USA, 2004
4 Wayne Low, "Code Injection via ROP", Virus Bulletin Oct, 2012
5 Royal P., Halpin M., Dagon D., Edmonds R., Wenke Lee, "PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware", Computer Security Applications Conference ACSAC, 2006
6 Min Gyung Kang, Pongsin Poosankam, Heng Yin, "Renovo: a hidden code extractor for packed executables", WORM '07 Proceedings of the ACM workshop on Recurring malcode, pp.46-53, 2007
7 Guhyeon Jeong, Euijin Choo, Joosuk Lee, Bat-Erdene, M., Heejo Lee "Generic unpacking using entropy analysis", Malicious and Unwanted Software on 5th International Conference, pp.98-105, 2010
8 Jusuk Lee, Kyoochang Jeong, Heejo Lee, "Detecting metamorphic malwares using code graphs", SAC '10 Proceedings of the 2010 ACM Symposium on Applied Computing, pp.1970-1977
9 wj32, "12 ways to terminate a process", http://wj32.org/wp/2009/05/10/12-ways-to-terminate-a-process/, 2009
10 Greg Hoglund, James Butler, "Rootkits: Subverting the Windows kernel", Addison-Wesley, 2006
11 Peter Kleissner, "Stoned Bootkit", Black Hat Europe, 2007