Using coverage analysis to extract Botnet command-and-control protocol
There are some inherent patterns in the bot execution trace coverage of basic blocks.Using these patterns,an approach was proposed to infer Botnet command-and-control protocol (C&C protocol).Without intermediate representation of binary code and constraints solving,this approach has a lo...
Saved in:
Main Authors: | Zhi WANG, Ya-yun CAI, Lu LIU, Chun-fu JIA |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.01.018/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Investigation on the botnets activities
by: HAN Xin-hui1, et al.
Published: (2007-01-01) -
Research on Webshell-based botnet
by: Ke LI, et al.
Published: (2016-06-01) -
Research on the reverse analyses and monitoring data of Mirai malware botnet
by: Ya-liang CHEN, et al.
Published: (2017-08-01) -
Research on cloud-based traffic adaptive command and control method for mobile botnet
by: Wei CHEN, et al.
Published: (2014-11-01) -
High resistance botnet based on smart contract
by: Hao ZHAO, et al.
Published: (2021-08-01)