References
- Wikipedia, Malware, http://en.wikipedia.org/wiki/ Malware/.
- Webopedia, Variant, http://www.webopedia.com/ TERM/V/variant.html/.
- 박남열, 김용민, 노봉남, "우회기법을 이용하는 악성코드 행위기반 탐지 방법", 정보보호학회 논문지, 제 16권, 제 3호, pp. 17-28, 2006년 6월.
- AV-Test, http://www.av-test.org/en/statistics/malware/.
- Symantec.cloud MessageLabs, Symantec Intelligence Report, Nov. 2011.
- Babak Bashari Rad and Maslin Masrom, "Metamorphic Virus Detection in Portable Executables Using Opcodes Statistical Feature", ICASEIT, Jan. 2011.
- 권종훈, 이제현, 정현철, 이희조, "행위 그래프 기반의 변종 악성코드 탐지", 정보보호학회 논문지, 제 21권, 제 2호, pp. 37-47, 2011년 4월.
- Keehyung Kim and Byung-Ro Moon, "Malware Detection based on Dependency Graph using Hybrid Genetic Algorithm", GECCO'10, pp. 1211- 1218, July 2010.
- Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, and Xifeng Yan, "Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors", 2010 IEEE Symposium on Security and Privacy, pp. 45-60, May 2010.
- F. Cohen, "Computer viruses: Theory and experiments", In DOD/NBS Com. and Sec. Conf., Vol. 6, pp. 22-35, Sep. 1987.
- D. Chess and S. White, "An undetectable computer virus", In Virus Bulletin Conf., Sep. 2000.
- A. Moser, C. Kruegel, and E. Kirda, "Limits of static analysis for malware detection", In ACSAC, pp. 421-430, Dec. 2007.
- A. Moser, C. Krugel, and E. Kirda, "Exploring multiple execution paths for malware analysis", IEEE Security and Privacy, pp. 231-245, May 2007.
- Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, and Wenke Lee, "PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware", IEEE, ACSAC'06, pp. 289-300, Dec. 2006.
- Kevin Coogan, Saumya Debray, Tasneem Kaochar, and Gregg Townsend, "Automatic Static Unpacking of Malware Binaries", IEEE, WCRE'09, pp. 167-176, Oct. 2009.
- M. D. Preda, M. Christodorescu, S. Jha, and S. Debray, "A Semantics-Based Approach to Malware Detection", ACM Trans. Program. Lang. Syst., Vol. 30, No. 5, Aug. 2008.
- V. S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar, "Signature Generation and Detection of Malware Families", ACISP, Vol. 5107, pp. 336-349, 2008
- 정구현, 추의진, 이주석, 이희조, "엔트로피를 이용한 실행 압축 해제 기법 연구", 한국정보기술학회 논문지, 제 7권, 제 1호, pp. 232-238, 2009년 2월.
- C. Willems, T. Holz, and F.C. Freiling, "Toward Automated Dynamic Malware Analysis Using CWSandbox", IEEE Security & Privacy, Vol. 5, No. 2, pp. 32-39, March 2007.
- C. K. Ulrich Bayer and E. Kirda, "Ttanalyze: A Tool for Analyzing Malware", In 15th Ann. Conf. of European Inst. for Computer Antivirus Research (EICAR), pp. 180-192, 2006.
- Anubis, http://anubis.iseclab.org/.
- Windows Sysinternals, Strings, http://technet. microsoft.com/en-us/sysinternals/bb897439/.
- Stud_PE, http://www.cgsoftlabs.ro/studpe.html/.
- PEView, http://www.magma.ca/-wjr/.
- SysAnalyzer, http://securitytnt.com/sysanalyzer/.
- CWSandbox, http://mwanalysis.org/.