完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, Chong-Kuanen_US
dc.contributor.authorLan, Shen-Chiehen_US
dc.contributor.authorShieh, Shiuhpyng Winstonen_US
dc.date.accessioned2019-04-02T06:04:49Z-
dc.date.available2019-04-02T06:04:49Z-
dc.date.issued2017-01-01en_US
dc.identifier.urihttp://hdl.handle.net/11536/150833-
dc.description.abstractAdvanced Persistent Threat (APT) attacks became a major network threat in recent years. Among APT attack techniques, sending a phishing email with malicious documents attached is considered one of the most effective ones. Although many users have the impression that documents are harmless, a malicious document may in fact contain shellcode to attack victims. To cope with the problem, we design and implement a malicious document detector called Forensor to differentiate malicious documents. Forensor integrates several open-source tools and methods. It first introspects file format to retrieve objects inside the documents, and then automatically decrypts simple encryption methods, e.g., XOR, rot and shift, commonly used in malware to discover potential shellcode. The emulator is used to verify the presence of shellcode. If shellcode is discovered, the file is considered malicious. The experiment used 9,000 benign files and more than 10,000 malware samples from a well-known sample sharing website. The result shows no false negative and only 2 false positives.en_US
dc.language.isoen_USen_US
dc.subjectmalicious documentsen_US
dc.subjectmalwareen_US
dc.subjectshellcodeen_US
dc.titleShellcode Detector for Malicious Document Huntingen_US
dc.typeProceedings Paperen_US
dc.identifier.journal2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTINGen_US
dc.citation.spage527en_US
dc.citation.epage528en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000450296400080en_US
dc.citation.woscount0en_US
顯示於類別:會議論文