MOMENTUM: MetamOrphic malware exploration techniques using MSA signatures
暂无分享,去创建一个
P. Vinod | V. Laxmi | M. S. Gaur | G. Chauhan
[1] N. Saitou,et al. The neighbor-joining method: a new method for reconstructing phylogenetic trees. , 1987, Molecular biology and evolution.
[2] Heejo Lee,et al. Code Graph for Malware Detection , 2008, 2008 International Conference on Information Networking.
[3] Guillaume Bonfante,et al. Control Flow Graphs as Malware Signatures , 2007 .
[4] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[5] Arun Lakhotia,et al. Using engine signature to detect metamorphic malware , 2006, WORM '06.
[6] Mark Stamp,et al. Hunting for undetectable metamorphic viruses , 2011, Journal in Computer Virology.
[7] Mark Stamp,et al. Hunting for metamorphic engines , 2006, Journal in Computer Virology.
[8] Qinghua Zhang,et al. MetaAware: Identifying Metamorphic Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[9] Guillaume Bonfante,et al. Architecture of a morphological malware detector , 2009, Journal in Computer Virology.
[10] Christus,et al. A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .
[11] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[12] Andrew Walenstein,et al. Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.