Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing
暂无分享,去创建一个
[1] Greg Hoglund,et al. Rootkits: Subverting the Windows Kernel , 2005 .
[2] Ming-Yang Kao,et al. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] S. B. Needleman,et al. A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.
[4] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[5] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.
[6] D. Higgins,et al. T-Coffee: A novel method for fast and accurate multiple sequence alignment. , 2000, Journal of molecular biology.
[7] Abhinav Srivastava,et al. System Call API Obfuscation (Extended Abstract) , 2008, RAID.
[8] Anja Feldmann,et al. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection , 2006, USENIX Security Symposium.
[9] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[10] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[11] Somesh Jha,et al. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors , 2010, 2010 IEEE Symposium on Security and Privacy.
[12] Somesh Jha,et al. Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms , 2011, CADE.
[13] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[14] Xuxian Jiang,et al. DroidChameleon: evaluating Android anti-malware against transformation attacks , 2013, ASIA CCS '13.
[15] Engin Kirda,et al. A View on Current Malware Behaviors , 2009, LEET.
[16] Yong Tang,et al. Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms , 2009, Comput. Secur..
[17] David Kotz,et al. People-Centric Urban Sensing: Security Challenges for the New Paradigm , 2007 .