Detection of metamorphic viruses: A survey
暂无分享,去创建一个
[1] Mark Stamp,et al. Chi-squared distance and metamorphic virus detection , 2013, Journal of Computer Virology and Hacking Techniques.
[2] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[3] Catalin Boja,et al. Optimization of Antivirus Software , 2007 .
[4] Sami Khuri,et al. ANALYSIS AND DETECTION OF METAMORPHIC COMPUTER VIRUSES , 2006 .
[5] Corporate,et al. The handbook of information security , 1991 .
[6] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[7] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[8] José Meseguer,et al. The Rewriting Logic Semantics Project , 2006, SOS@ICALP.
[9] Mattia Monga,et al. Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.
[11] Sjsu ScholarWorks,et al. Metamorphic Detection via Emulation , 2014 .
[12] Grant Malcolm,et al. Detection of metamorphic computer viruses using algebraic specification , 2006, Journal in Computer Virology.
[13] Arun Lakhotia,et al. Imposing order on program statements to assist anti-virus scanners , 2004, 11th Working Conference on Reverse Engineering.
[14] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[15] Philippe Beaucamps. Advanced Polymorphic Techniques , 2007 .
[16] Christian Callegari,et al. Advances in Computing, Communications and Informatics (ICACCI) , 2015 .
[17] John Aycock,et al. Computer Viruses and Malware , 2006, Advances in Information Security.