Automated reverse engineering of malware to develop network signatures to match with known network signatures

作者: Dan Sinema

DOI:

关键词:

摘要: Automated Reverse Engineering of Malware to Develop Network Signatures Match With Known

参考文章(14)
Paul Barford, Vinod Yegneswaran, An Inside Look at Botnets Advances in Information Security. pp. 171- 191 ,(2007) , 10.1007/978-0-387-44599-1_8
Fredrik Valeur, Christopher Kruegel, Giovanni Vigna, William Robertson, Static disassembly of obfuscated binaries usenix security symposium. pp. 18- 18 ,(2004)
Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh, Automatic Generation of String Signatures for Malware Detection recent advances in intrusion detection. pp. 101- 120 ,(2009) , 10.1007/978-3-642-04342-0_6
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
Sanmeet Kaur, Maninder Singh, Automatic attack signature generation systems: A review ieee symposium on security and privacy. ,vol. 11, pp. 54- 61 ,(2013) , 10.1109/MSP.2013.51
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Rokach, Auto-Sign: an automatic signature generator for high-speed malware filtering devices Journal in Computer Virology. ,vol. 6, pp. 91- 103 ,(2010) , 10.1007/S11416-009-0119-3
Asaf Shabtai, Eitan Menahem, Yuval Elovici, F-Sign: Automatic, Function-Based Signature Generation for Malware systems man and cybernetics. ,vol. 41, pp. 494- 508 ,(2011) , 10.1109/TSMCC.2010.2068544
Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Honeycyber: Automated signature generation for zero-day polymorphic worms military communications conference. pp. 1- 6 ,(2008) , 10.1109/MILCOM.2008.4753178