| 1 |
Using Entropy Analysis to Find Encrypted and Packed Malware  |
미소장 |
| 2 |
Microsoft. Microsoft PE and COFF Specification. Microsoft Corporation, Redmond, WA, revision 8.2, http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx. [Accessed: Jan. 01, 2010] |
미소장 |
| 3 |
T. Anselm and S. Arran, "Human-Readable Real-Time Classifications of Malicious Executables", Proceedings of the 10th Australian Information Security Management Conference, Dec. 2012. |
미소장 |
| 4 |
M. Z. Shafiq, S. M. Tabish, F. Mirza, and M. Farooq, "PE-Miner: Mining structural information to detect malicious executables in realtime", Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID ‟09), Berlin, Heidelberg, Springer-Verlag, pp. 121-141, Sep. 2009. |
미소장 |
| 5 |
M. Shafiq, S. Tabish, and M. Farooq, "PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables", Proceedings of Virus Bulletin Conference, pp. 29-33, Jun. 2009. |
미소장 |
| 6 |
M. G. Schultz, E. Eskin, F. Zadok, and S. J. Stolfo, "Data mining methods for detection of new malicious executables", In: Security and Privacy, S&P 2001. Proceedings, IEEE Symposium on. IEEE, pp. 38-49, May 2001. |
미소장 |
| 7 |
J. Z. Kolter and M. A. Maloof, "Learning to detect malicious executables in the wild", Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining (KDD '04), Seattle, WA, USA. ACM Press. pp. 470-478, 2004. |
미소장 |
| 8 |
M. obert, F. lint, T. Nir, B. Eugene, G. Marina, D. Shlomi, and E. Yuval, "Unknown malcode detection using opcode representation", in Intelligence and Security Informatics, D. Ortiz-Arroyo, H. L. Larsen, D. D. Zeng,D. Hicks, and G. Wagner, Eds., Vol. 5376 of Lecture Notes in Computer Science, pp. 204-215, 2008. |
미소장 |
| 9 |
Unknown malcode detection and the imbalance problem  |
미소장 |
| 10 |
Detecting unknown malicious code by applying classification techniques on OpCode patterns  |
미소장 |
| 11 |
A Malware Detection Scheme Based on Mining Format Information  |
미소장 |
| 12 |
Belaoued and Mazouzi, "A Real-Time PEMalware Detection System Based on CHI-Square Test and PE-File Features", International Conference on Computer Science and its Applications, IFIPAICT, Vol. 456, pp. 416-425, 2015. DOI: 10.1007/978-3-319-19578-0_34 |
미소장 |
| 13 |
Exploring Discriminatory Features for Automated Malware Classification  |
미소장 |
| 14 |
J. I. Park, H. B. Park, and S. S. Lee, "Study on Automatic Analysis Method Based On Malware Behavior", Proceedings of KIIT Summer Conference, pp. 311-312, Jun. 2017. |
미소장 |
| 15 |
A. Baranovich, "VX Heavens", http://vx.netlux.org. [Accessed: Jan. 01, 2012] |
미소장 |
| 16 |
D. Quist, "Offensive computing", http://www.offensivecomputing.net. [Accessed: Jan. 01, 2012] |
미소장 |
| 17 |
J. Han and M. Kamber, "Data Mining: Concepts and Techniques", Morgan Kaufmann, 2nd edition. 2006. |
미소장 |
| 18 |
R. Perdisci, A. Lanzi, and W. Lee, "Classification of packed executables for accurate computer virus detection", Pattern Recognition Letters, Vol. 29, No. 4, pp. 1941-1946, Jun. 2008. |
미소장 |