An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
スポンサーリンク
概要
- 論文の詳細を見る
- 2011-09-01
著者
-
SONG Jungsuk
National Institute of Information and Communications Technology
-
INOUE Daisuke
National Institute of Information and Communications Technology
-
ETO Masashi
National Institute of Information and Communications Technology
-
KIM Hyung
National Institute of Information and Communications Technology
-
NAKAO Koji
National Institute of Information and Communications Technology
-
Shikata J
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Matsumoto T
Yokohama National Univ. Yokohama‐shi Jpn
-
Yoshioka K
The Graduate School Of Environment And Information Sciences Yokohama National University
-
Orii Tatsunori
The Yokohama National University
-
KIM Hyung
the National Institute of Information and Communications Technology (NICT)
-
YOSHIOKA Katsunari
the Yokohama National University
-
INOUE Daisuke
the National Institute of Information and Communications Technology (NICT)
-
SONG Jungsuk
the National Institute of Information and Communications Technology (NICT)
-
ETO Masashi
the National Institute of Information and Communications Technology (NICT)
-
SHIKATA Junji
the Yokohama National University
-
MATSUMOTO Tsutomu
the Yokohama National University
-
NAKAO Koji
the National Institute of Information and Communications Technology (NICT)
-
ETO Masashi
the National Institute of Information and Communications Technology
関連論文
- 17-エチニルエストラジオール処理幼若ラットの子宮および膣におけるエストロゲン受容体ER-αとER-βの発現(毒性学)
- O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- 招待講演 nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis
- Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
- Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
- Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
- Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
- Special Section on Information Theory and Its Applications
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- A Traitor Traceable Conference System with Dynamic Sender(Special Section on Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM
- A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- O-means : An Optimized Clustering Method for Analyzing Spam Based Attacks
- A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
- On Collusion Security of Random Codes(Biometrics)(Cryptography and Information Security)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Clone Match Rate Evaluation for an Artifact-metric System (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code (特集 電子社会に向けたコンピュータセキュリティ技術)
- P2P Network Traffic Analysis Using Data Mining Engines
- A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- An Accurate Packer Identification Method Using Support Vector Machine
- Towards Cost-Effective P2P Traffic Classification in Cloud Environment