A multiple layered approach to malware identification and classification problem
暂无分享,去创建一个
[1] Eldad Eilam,et al. Reversing: Secrets of Reverse Engineering , 2005 .
[2] Tzi-cker Chiueh,et al. A Study of the Packer Problem and Its Solutions , 2008, RAID.
[3] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[4] Eric Filiol,et al. Formalization of malware through process calculi , 2009, ArXiv.
[5] Peter Martini,et al. Classification and detection of metamorphic malware using value set analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[6] Burak Bayoğlu,et al. Polymorphic worm detection using strong token-pair signatures , 2009 .
[7] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[8] Steve R. White,et al. An Undetectable Computer Virus , 2000 .