|
[1] Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, Reading (2005) [2] Feily, M., Shahrestani, A. & Ramadass, S. 2009, A survey of botnet and botnet detection, Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '09), pp. 268-273. [3] Heng, Y., Dawn, S., Manuel, E., Christopher, K. & Engin, K. 2007, Panorama: Capturing system-wide information flow for malware detection and analysis, Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, ACM. [4] Colleen Shannon and David Moore. The spread of the witty worm. Security&Privacy Magazine, 2(4):46.50, 2004. [5] Kapersky, http://www.kaspersky.com.tw/ [6] Tred Micro, http://tw.trendmicro.com/ [7] Avira, http://www.avira.com/ [8] Clam Anti-Virus http://www.clamav.net/lang/en/ [9] Project Honey Pot. http://www.projecthoneypot.org/ [10] P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In ACSAC, pages 289–300, 2006. [11] M. Gheorghescu. An Automated Virus Classification System. In Virus Bulletin conference, 2005. [12] T. Dullien and R. Rolles. Graph-based comparison of Executable Objects. In In Symposium sur la S′ecurit′e des Technologies de l’Information et des Communications (SSTIC), June 2005. [13] Bilar. Statistical structures: Fingerprinting malware for classification and analysis. In Blak Hat,2006 [14] Mamoun Alazab , Sitalakshmi Venkataraman, and Paul Watters . In Proceedings of the 2010 Cybercrime and Trustworthy Computing Workshop (CTC), 9-20 July 2010 [15] R. Tian, L. Batten, R. Islam, and S. Versteeg, “An automated classification system based on the strings of trojan and virus families,” in Proc. of MALWARE 2009, the 4th Intl. Conf. on Malicious and Unwanted Software, Oct. 2009, pp. 23–30. [16] U. Bayer, P. Milani Comparetti, C. Hlauscheck, C. Kruegel, and E. Kirda, “Scalable, Behavior-Based Malware Clustering,” In 16th Symposium on Network 31 and Distributed System Security, 2009. [17] T. Lee and J. J. Mody. Behavioral Classification. In EUROPEAN EXPERT GROUP FOR IT-SECURITY(EICAR) Conference, 2006. [18] M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated classification and analysis of internet malware. In Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID’07), September 2007. [19] Sumit Gulwani, Sagar Jain, and Eric Koskinen. Control-flow refinement and progress invariants for bound analysis. In PLDI, 2009. [20] C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In CCS ’03: Proceedings of the 10th ACM conference on Computer and communications security, pages 290–299, New York, NY, USA, 2003. ACM. [21] A. Moser, C. Kruegel, and E. Kirda. Limits of Static Analysis for Malware Detection. In ACSAC, pages 421–430. IEEE Computer Society, 2007. [22] J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of NDSS ’05, San Diego, California, USA, February 2005. [23] A. Moser, C. Kruegel, and E. Kirda. Exploring multiple execution paths for malware analysis. In Security and Privacy, 2007. SP ’07. IEEE Symposium on, pages 231–245, 2007. [24] J. Crandall and F. Chong. Minos: Architectural support for software security through control data integrity. In International Symposium on Microarchitecture, 2004. [25] UDIS86, http://udis86.sourceforge.net/ [26] A. Z. Broder, S. C. Glassman, M. S. Manasse, and G. Zweig. Syntactic clustering of the web.omput. Netw. ISDN Syst., 29(8-13):1157–1166, 1997. [27] J. Gower and G. Ross, “Minimum Spanning Trees and Single Linkage Cluster Analysis,” Applied Statistics, vol. 18, no. 1, pp. 54-64, 1969. [28] F. Bellard. Qemu, a fast and portable dynamic translator. In USENIX Annual Technical Conference, FREENIX Track, April 2005. [29] U.S. Department of Commerce. FIPS 180-1: Secure Hash Standard, Federal Information Processing Standards Publication, N.I.S.T., April 1995. [30] UPX, http://upx.sourceforge.net/ [31] ASPACK, http://www.aspack.com/ [32] PECompact, http://bitsum.com/pecompact.php [33] WWPACK32, http://www.wwpack32.venti.pl/
|