|
1.Malware. Available from: http://en.wikipedia.org/wiki/Malware. 2.G Data Malware Report - Half-yearly report, 2011. 3.2011 年網路犯罪損失研究報告. 2011; Available from: http://www8.hp.com/tw/zh/m/article.do?id=1059942&title=2011+年網路犯罪損失研究報告. 4.CWSandbox. Available from: http://www.gfi.com/malware-analysis-tool. 5.Zeus. Available from: http://en.wikipedia.org/wiki/Zeus_(trojan_horse). 6.Binsalleeh, H., et al., On the Analysis of the Zeus Botnet Crimeware Toolkit, in Privacy Security and Trust2010. 7.Christodorescu, M. and S. Jha, Static Analysis of Executables to Detect Malicious Patterns, 2003. 8.Moser, A., C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, in ACSAC 20072007. 9.Capture-BAT. Available from: https://honeynet.org/node/315. 10.Seiferta, C., et al., Capture – A behavioral analysis tool for applications and documents. Digital Investigation, 2007. 4. 11.Wireshark. Available from: http://www.wireshark.org. 12.Bayer, U., et al., Dynamic analysis of malicious code. COMPUTER VIROLOGY, 2006. 2. 13.QEMU. Available from: http://wiki.qemu.org/Main_Page. 14.Sober.Y. Available from: http://www.f-secure.com/v-descs/sober_y.shtml. 15.Miwa, S., et al., Design Issues of an Isolated Sandbox Used to Analyze Malwares. 2007. 16.StarBED. Available from: http://www.starbed.org/. 17.Tshark. Available from: http://www.wireshark.org/docs/man-pages/tshark.html. 18.Volatility. Available from: https://www.volatilesystems.com/default/volatility. 19.Rootkit. Available from: http://en.wikipedia.org/wiki/Rootkit. 20.Robust Process Scanner. Available from: http://moyix.blogspot.com/2010/07/plugin-post-robust-process-scanner.html. 21.Hooking. Available from: http://en.wikipedia.org/wiki/Hooking. 22.IAT Function Hooking. Available from: http://sandsprite.com/CodeStuff/IAT_Hooking.html. 23.Inline Hooking in Windows. Available from: http://www.exploit-db.com/download_pdf/17802/. 24.Malware Domain List. Available from: http://www.malwaredomainlist.com. 25.Honeypot. Available from: http://en.wikipedia.org/wiki/Honeypot_(computing). 26.TWISC@NCKU. Available from: http://www.twisc.ncku.edu.tw. 27.SpyEye Bot versus Zeus Bot. Available from: http://www.symantec.com/connect/blogs/spyeye-bot-versus-zeus-bot. 28.Stover, S., et al., analysis of the Stormand Nugache trojans: P2P is here, in;login:2007. 29.Koobface. Available from: http://en.wikipedia.org/wiki/Koobface. 30.Malbed. Available from: http://malbed.twisc.ncku.edu.tw. 31.VirusTotal. Available from: http://www.virustotal.com. 32.Eads, J., EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination, in Computer Science2010, Missouri University. 33.W32/Koobface-AZ. Available from: http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/W32~Koobface-AZ/detailed-analysis.aspx.
|