參考文獻 |
[1] McAfee Threats Report, Q1 2011
https://secure.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2011.pdf
[2] Anti-Virus Comparative No. 25, Feb 2010
http://www.av-comparatives.org/images/stories/test/ondret/avc_report25.pdf
[3] Microsoft Corp., Overview of the Windows API
http://msdn.microsoft.com/en-us/library/Aa383723
[4] Microsoft Corp., Introduction to Win32/Win64
http://technet.microsoft.com/en-us/library/bb496995.aspx
[5] Microsoft Corp., hooked ShimEng.dll
http://forum.sysinternals.com/hooked-shimengdll_topic18127.html
[6] Microsoft Corp., An In-Depth Look into the Win32 Portable Executable File Format
http://msdn.microsoft.com/en-us/magazine/cc301805.aspx
[7] Microsoft Corp., Peering Inside the PE: A Tour of the Win32 Portable Executable File Format
http://msdn.microsoft.com/en-us/library/ms809762.aspx
[8] Microsoft Corp., Sysinternals
http://technet.microsoft.com/en-us/sysinternals/bb545021
[9] Wikipedia, Autorun
http://en.wikipedia.org/wiki/Autorun
[10] Wikipedia, Computer Virus
http://en.wikipedia.org/wiki/Computer_virus
[11] Wikipedia, DLL Injection
http://en.wikipedia.org/wiki/DLL_injection
[12] Wikipedia, Malware
http://en.wikipedia.org/wiki/Malware
[13] Wikipedia, Native API
http://en.wikipedia.org/wiki/Native_API
[14] Wikipedia, Stuxnet
http://en.wikipedia.org/wiki/Stuxnet
[15] Wikipedia, Timeline of Computer Virus and Worms
http://en.wikipedia.org/wiki/Timeline_of_notable_computer_viruses_and_worms
[16] Wikipedia, Windows
http://en.wikipedia.org/wiki/Windows
[17] Wikipedia, Windows API
http://en.wikipedia.org/wiki/Windows_API
[18] 「熊貓燒香」病毒設計者出獄 改邪歸正當掃毒顧問
http://www.nownews.com/2010/01/06/162-2555103.htm
[19] 雲端運算安全趨勢blog, 網路犯罪年產值高於全球販毒營收總額
http://domynews.blog.ithome.com.tw/trackbacks/1252/21372
[20] ZDNet, 問世20年,電腦病毒仍無解(上)
http://www.zdnet.com.tw/news/pix/0,2000085677,20086011,00.htm
[21] ZDNet, 問世20年,電腦病毒仍無解(下)
http://www.zdnet.com.tw/news/software/0,2000085678,20086025,00.htm
[22] 旻盛資訊有限公司, 讓電腦遠離USB病毒(1)
http://www.sweb.com.tw/modules/psbb/?op=openthr&id=31
[23] 趨勢科技, 2008 技術通報 - USB病毒防治要點
http://tw.trendmicro.com/tw/support/tech-support/board/tech/article/20080110081233.html
[24] iThome, 天啊!我的隨身碟又中毒了
http://www.ithome.com.tw/itadm/article.php?c=47219&s=1
[25] 不易分析來源與感染途徑的USB病毒
http://www.ithome.com.tw/itadm/article.php?c=47219&s=2
[26] USB病毒成為企業最頭痛的資安漏洞
http://www.ithome.com.tw/itadm/article.php?c=47370
[27] 我的隨身碟中毒了,該怎麼辦
http://netsrv.nutn.edu.tw/isms_web/e-paper/e-paper001.htm
[28] 惡意程式的隱形斗篷-rootkits
http://albertinformation.blogspot.com/2010/03/rootkit.html
[29] USB Worms Top The List of Malware in Q1 2010
https://blog.ironkey.com/?p=976
[30] Process-wide API spying
http://www.codeproject.com/KB/system/api_spying_hack.aspx?msg=918790
[31] IAT Function Hooking
http://sandsprite.com/CodeStuff/IAT_Hooking.html
[32] EAT Hooking
http://0v1.org/forums/topic337.html
[33] UNKNOWN CHEATS, Writing drivers to perform kernel-level SSDT Hooking.
http://www.uc-forum.com/forum/c-and-c/59147-writing-drivers-perform-kernel-level-ssdt-hooking.html
[34] Offensive Computing
http://offensivecomputing.net
[35] PassMark
http://www.passmark.com
[36] 俞甲子, 石凡, 潘愛民, 程式設計師的自我修養 碁峯資訊股份有限公司
[37] 段鋼, 加密與解密第三版, 碁峯資訊股份有限公司
[38] 羅雲彬, Windows環境下32位元組合語言程式設計
[39] 陳介文, 許富皓, Antivirus Software Shield against the Antivirus Terminator, 國立中央大學資訊工程系碩士論文
[40] Peter Ferrie. Attacks on Virtual Machine Emulators. Symantec Advanced Threat Research
[41] S. Mukkamala, A. Sung, J. Xu, and P. Chavez. Static analyzer for vicious executables (SAVE). In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC’04), pages 326-334, Tucson, AZ, USA, Dec. 2004.
[42] J. Xu, A. H. Sung, P. Chavez, and S. Mukkamala. Polymorphic malicious executable scanner by API sequence analysis. In Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS’04), pages 378-383, Kitakyushu, Japan, Dec. 2004. IEEE Computer Society.
[43] Abhinav Srivastava, Jonathon Giffin. Automatic Discovery of Parasitic Malware. In International Symposium on Recent Advances in Intrusion Detection (RAID), Sept. 2010
[44] Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jon Giffin, Somesh Jha. Automatic Generation of Remediation Procedures for Malware Infections. USENIX Security Symposium, Aug. 2010
[45] E. Passerini, R. Paleari, and L. Martignoni. How good are malware detectors at remediating infected systems? In 6th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Como, Italy, July 2009.
|