메모리 실행영력 추적을 사용한 버퍼오버플로 악성코드 탐지기법
Vol. 19, No. 5, pp. 189-194,
10월.
2009
10.13089/JKIISC.2009.19.5.189, Full Text:
Keywords: Buffer Overflow, API, Anti-Virus, NOP Detect
Abstract Statistics
Cite this article
10.13089/JKIISC.2009.19.5.189, Full Text:
Keywords: Buffer Overflow, API, Anti-Virus, NOP Detect
Abstract Statistics
Cite this article
[IEEE Style]
S. Choi, J. Cho, J. Moon, "Buffer Overflow Malicious Code Detection by Tracing Executable Area of Memory," Journal of The Korea Institute of Information Security and Cryptology, vol. 19, no. 5, pp. 189-194, 2009. DOI: 10.13089/JKIISC.2009.19.5.189.
[ACM Style]
Sung-Woon Choi, Jae-Ik Cho, and Jong-Sub Moon. 2009. Buffer Overflow Malicious Code Detection by Tracing Executable Area of Memory. Journal of The Korea Institute of Information Security and Cryptology, 19, 5, (2009), 189-194. DOI: 10.13089/JKIISC.2009.19.5.189.