1 |
"AhnLab Security Emergency response Center Report, 2017 Q4 Cyber Threat Trend Report", (Jan, 2018), https://www.ahnlab.com/kr/site/securityinfo/asec/asecView.do?groupCode=VNI001&seq=27109, (Sep/18/2018).
|
2 |
Jesse Smelcer. "The rise of Fileless malware". in Partial Fulfillment of the Requirements for the Degree of Master of Science in Cybersecurity, December 2017.
|
3 |
David Patten. "The Evolution to Fileless Malware". East Carolina University, 2017.
|
4 |
Liam O' Murchu and Fred P. Gutierrez. "The evolution of the fileless click-fraud malware Poweliks", Symantec Security Response, June 9, 2015.
|
5 |
Yang-seo Choi, Ik-kyun Kim, Jin-tae Oh and Jae-cheol Ryou. PE File Header Analysis-Based Packed PE File Detection Technique (PHAD), Computer Science and its Applications, International Symposium on, pp. 28-31, Oct. 13, 2008.
|
6 |
Kris, Kendall and McMillan, Chad.Practical "Malware Analysis". Black Hat Conference, USA ,p. 10, 2007.
|
7 |
You, Ilsun and Yim, Kangbin. "Malware obfuscation techniques: A brief survey". Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on, IEEE, pp. 297-300, 2010.
|
8 |
Sikorski, Michael and Honig, Andrew. "Practical malware analysis: the hands-on guide to dissecting malicious software", Published by nostarch press, 2012.
|
9 |
Nasi and Emeric. "PE Injection Explained Advanced memory code injection technique". Creative Commons Attribution-NonCommercial-NoDerivs, volume 3, 2014.
|
10 |
Willems, Carsten and Holz. "Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy", IEEE, volume 5, Issue 2, pages 32-39, 2007.
DOI
|
11 |
Seong Il Bae and Eul Gyu Im. "Unpacking Technique for Process Injection Malware", 2018 Workshop on Dependable and Secure Computation, Aug, 16, 2018.
|