Slide 34
Slide 34 text
Overview ‘White Box’ Approaches Active Defenses R0D ABCD TEAM Epilogue/References nth order
References II
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, The nepenthes platform: An
e cient approach to collect malware, Lecture notes in computer science (2006), 165–184.
Bill Blunden, The rootkit arsenal: Escape and evasion in the dark corners of the system,
Wordware Publishing, 2009.
D. Bilar, J. Murphy, and G. Cybenko, Adversarial dynamics: Conficker case study, Moving
Target Defenses (S. Jajodia, ed.), vol. II, Springer, 2013, pp. 41–71.
Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, and
Shankar Sastry, Attacks against process control systems: risk assessment, detection, and
response, Proceedings of the 6th ACM Symposium on Information, Computer and
Communications Security (New York, NY, USA), ASIACCS ’11, ACM, 2011, pp. 355–366.
X. Chen, J. Andersen, Z.M. Mao, M. Bailey, and J. Nazario, Towards an understanding of
anti-virtualization and anti-debugging behavior in modern malware, Dependable
Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International
Conference on, IEEE, 2008, pp. 177–186.
George Cybenko and Vincent Berk, An overview of process query systems, Proc. SPIE, vol.
5403, 2004.
, Process detection in homeland security and defense applications, Proc. SPIE
6201 (2006).
Varun Chandola, Arindam Banerjee, and Vipin Kumar, Anomaly detection: A survey, ACM
Comput. Surv. 41 (2009), no. 3, 15:1–15:58.