03.06.2013 Views

Un modello integrato control-flow e data-flow per il rilevamento ...

Un modello integrato control-flow e data-flow per il rilevamento ...

Un modello integrato control-flow e data-flow per il rilevamento ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

70 5. Bibliografia<br />

[13] Christopher Kruegel, Darren H. Mutz, Fredrik Valeur, and Giovanni Vigna. On<br />

the detection of anomalous system call arguments.<br />

[14] Cullen Linn and Saumya Debray. Obfuscation of executable code to improve<br />

resistance to static disassembly. 2003.<br />

[15] Carlo Maiero and Marino Miculan. <strong>Un</strong>observable intrusion detection based on<br />

call traces in paravirtualized systems.<br />

[16] Xu Ming, Chen Chun, and Ying Jing. Anomaly detection based on system call<br />

classification. 2003.<br />

[17] Aleph One. Smashing the stack for fun and profit. Phrack #49, 1996.<br />

[18] L. Pitt and M. Warmuth. The minimum consistency dfa problem cannot be<br />

approximated within any polynomial. ACM STOC, 1989.<br />

[19] M<strong>il</strong>a Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A<br />

semantics-based approach to malware detection. 2007.<br />

[20] M<strong>il</strong>a Dalla Preda, Matias Madou, Koen De Bosschere, and Roberto Giacobazzi.<br />

Opaque predicates detection by abstract interpretation.<br />

[21] R. Sekar, M. Bendre, D. Dhurjati, and P.Bollineni. A fast automaton-based<br />

method for detecting anomalous program behaviors. 2001.<br />

[22] Gaurav Tandon and Ph<strong>il</strong>ip Chan. Learning rules from system call arguments<br />

and sequences for anomaly detection.<br />

[23] theo detristan, tyll ulenspiegel, yann malcom, and mynheer su<strong>per</strong>bus von un-<br />

derduk. Polymorphic shellcode engine using spectrum analysis. Phrack #61,<br />

2003.<br />

[24] David Wagner and Drew Dean. Intrusion detection via static analysis.<br />

[25] Richard Wartell, Yan Zhou, Kevin W. Hamlen, Murat Kantarcioglu, and<br />

Bhavani Thuraisingham. Differentiating code from <strong>data</strong> in x86 binaries. 2011.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!