{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:40:05Z","timestamp":1729662005930,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199134","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T16:20:30Z","timestamp":1250007630000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique"],"prefix":"10.1109","author":[{"given":"D.","family":"Kim","sequence":"first","affiliation":[]},{"given":"I.","family":"Kim","sequence":"additional","affiliation":[]},{"given":"J.","family":"Oh","sequence":"additional","affiliation":[]},{"given":"H.","family":"Cho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"polymorphic blending attacks","author":"fogla","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"22","article-title":"emulation-based detection of non-self-contained polymorphic shellcode","author":"polychronakis","year":"0","journal-title":"Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID) 2007"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30143-1_11","article-title":"anomalous payload-based network intrusion detection","author":"wang","year":"2004","journal-title":"Proceedings of the 7th International Symposium on Recent Advanced in Intrusion Detection (RAID)"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1007\/11856214_12","article-title":"anagram: a content anomaly detector resistant to mimicry attack","author":"wang","year":"2006","journal-title":"Proceedings of the 9th International Symposium on Recent Advanced in Intrusion Detection (RAID)"},{"key":"15","article-title":"a fast static analysis approach to detect exploit code inside network flows","author":"chinchani","year":"2005","journal-title":"Proceedings of the 8th International Symposium on Recent Advanced in Intrusion Detection (RAID)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.30"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"14","article-title":"polymorphic worm detection using structural information of executables","author":"krugel","year":"2005","journal-title":"Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"11","article-title":"automated worm fingerprinting","author":"singh","year":"2004","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"12","first-page":"32","article-title":"hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience","author":"li","year":"2006","journal-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy"},{"key":"21","article-title":"analyzing network traffic to detect self-decrypting exploit code","author":"zhang","year":"0","journal-title":"Proceedings of the ACM Symposium on Information Computer and Communications Security (ASIACCS) 2007"},{"journal-title":"K2 ADMmutate","year":"0","key":"3"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/11790754_4","article-title":"network-level polymorphic shellcode detection using emulation","author":"polychronakis","year":"2006","journal-title":"Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'06)"},{"journal-title":"Metasploit","year":"0","key":"2"},{"journal-title":"SNORT","year":"0","key":"1"},{"key":"10","first-page":"271","article-title":"autograph: toward automated, distributed worm signature detection","author":"kim","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"7","first-page":"375","article-title":"stride: polymorphic sled detection through instruction sequence analysis","author":"akritidis","year":"2005","journal-title":"Proceedings of the 20th IFIP International Information Security Conference (SEC'05)"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36084-0_15","article-title":"accurate buffer overflow detection via","author":"toth","year":"2002","journal-title":"Proceedings of the 5th Symposium on Recent Advances in Intrusion Detection (RAID)"},{"journal-title":"Alpha2","year":"0","author":"wever","key":"5"},{"key":"4","article-title":"polymorphic shellcode engine using spectrum analysis","volume":"11","author":"detristan","year":"2003","journal-title":"Phrack"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/11506881_3","article-title":"experiences using minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities","author":"crandal","year":"2005","journal-title":"Proceedings of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)"},{"key":"8","first-page":"235","article-title":"buttercup: on network based detection of polymorphic buffer overflow vulnerabilities","author":"pasupulati","year":"2004","journal-title":"Proc Network Operations and Management Symp (NOMS 96)"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","start":{"date-parts":[[2009,6,14]]},"location":"Dresden, Germany","end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199134.pdf?arnumber=5199134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T18:44:52Z","timestamp":1497811492000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199134\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199134","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}