Semantic detection of malicious code based on the normalized system call
暂无分享,去创建一个
[1] Somesh Jha,et al. A semantics-based approach to malware detection , 2008, TOPL.
[2] Huang Hao. Detection method of Trojan horse based on attack tree , 2008 .
[3] Wu Hao. An Attack Tree Approach for SCRIPT Virus Sample Analysis , 2005 .
[4] Mao Jian. A Malicious Behavior Analysis Method Based on Program Semantic , 2008 .
[5] Sun Xiao-yan. Hierarchical method to analyze malware behavior , 2010 .
[6] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[7] Qian Huang,et al. Hierarchical method to analyze malware behavior: Hierarchical method to analyze malware behavior , 2010 .
[8] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[9] Somesh Jha,et al. A Layered Architecture for Detecting Malicious Behaviors , 2008, RAID.
[10] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[11] Su Pu. Intrusion Detection Model Based on Executable Static Analysis , 2006 .