参考文献
[1]国家计算机网络应急技术处理协调中心.2014年中国互联网网络安全报告[M].北京:人民邮电出版社,2014.
[2]Corp S.Symantec Global Internet Security Threat Report[EB/OL].(2008-06-29).https://www.symantec.com/connect/downloads/symantec-global-internet-security-threat-report-trends-2008.
[3]Hu X,Chiueh T C,Shin K G.Large-scale Malware Indexing Using Function-call Graphs[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:611-620.
[4]付文,赵荣彩,庞建民,等.隐式API调用行为的静态检测方法[J].计算机工程,2010,36(14):108-110.
[5]Zhang Ruoyu,Huang Shiqiu,Qi Zhegnwei,et al.Static Program Analysis Assisted Dynamic Taint Tracking for Software Vulnerability Discovery[J].Computers & Mathematics with Applications,2012,63(2):469-480.
[6]Moser A,Kruegel C,Kirda E.Exploring Multiple Execution Paths for Malware Analysis[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2007:231-245.
[7]Royal P,Halpin M,Dagon D,et al.Polyunpack:Automating the Hidden-code Extraction of Unpack-executing Malware[C]//Proceedings of the 22nd Annual Computer Security Applications Conference.Washington D.C.,USA:IEEE Press,2006:289-300.
[8]Oberheide J,Bailey M,Jahanian F.PolyPack:An Automated Online Packing Service for Optimal Antivirus Evasion[C]//Proceedings of the 3rd USENIX Conference on Offensive Technologies.New York,USA:ACM Press,2009.
[9]Boote B.How to Write Your Own Packer[EB/OL].[2015-05-17].http://www.docin.com/p-707956834.html.
[10]Tan Xiaodong.Anti-unpacker Tricks in Malicious Code[C]//Proceedings of the 10th Annual AVAR International Conference.Berlin,Germany:Springer,2007:33-38.
[11]Ugarte-Pedrero X,Balzarotti D,Santos I,et al.SoK:Deep Packer Inspection:A Longitudinal Study of the Complexity of Run-time Packers[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2015:659
-673.
[12]Brumley D,Hartwig C,Liang Z,et al.Automatically Identifying Trigger-based Behavior in Malware[M].Berlin,Germany:Springer,2008.
[13]Garfinkel T,Adams K,Warfield A,et al.Compatibility Is Not Transparency:VMM Detection Myths and Realities[C]//Proceedings of the 11th Workshop on Hot Topics in Operating Systems.New York,USA:ACM Press,2007:6.
[14]王志,贾春福,鲁凯.基于环境敏感分析的恶意代码脱壳方法[J].计算机学报,2012,35(4):693-702.
[15]Xie Peidai,Lu Xicheng,Wang Yongjun,et al.An Automatic Approach to Detect Anti-debugging in Malware Analysis[M].Berlin,Germany:Springer,2013.
[16]Lee J,Kang B,Im E G.Evading Anti-debugging Techniques with Binary Substitution[J].International Journal of Security & Its Applications,2014,8(1):183-192.
[17]Shang Shanhu,Zheng Ning,Xu Jian,et al.Detecting Malware Variants via Function-call Graph Similar-ity[C]//Proceedings of the 5th International Conference on Malicious and Unwanted Software.Washington D.C.,USA:IEEE Press,2010:113-
120.
[18]Xu Ming,Wu Lingfen,Qi Shuhui,et al.A Similarity Metric Method of Obfuscated Malware Using Function-call Graph[J].Journal of Computer Virology and Hacking Techniques,2013,9(1):35-47.
[19]刘星,唐勇.恶意代码的函数调用图相似性分析[J]. 计算机工程与科学,2014,36(3):481-486.
编辑陆燕菲 |