Malware Obfuscation Techniques: A Brief Survey
暂无分享,去创建一个
[1] P. Constantinou,et al. Interference and compatibility issues between the mobile satellite service and the fixed service in the Ku band , 2004, 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514).
[2] Mark Stamp,et al. Hunting for metamorphic engines , 2006, Journal in Computer Virology.
[3] David M. Pozar,et al. Anomalous mutual coupling between microstrip antennas , 1994 .
[4] R. Waterhouse,et al. Design of wide-band aperture-stacked patch microstrip antennas , 1998 .
[5] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[6] Jean-Francois Zurcher. The SSFIP: a global concept for high-performance broadband planar antennas , 1988 .
[7] Eunjin Jung,et al. Obfuscated malicious javascript detection using classification techniques , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[8] R. J. Mailloux,et al. Antenna array architecture , 1992, Proc. IEEE.
[9] Arini Balakrishnan,et al. Code Obfuscation Literature Survey , 2005 .
[10] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[11] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[12] Sahin Albayrak,et al. Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[13] Evgenios Konstantinou,et al. Metamorphic Virus: Analysis and Detection , 2008 .
[14] Ludovic Mé,et al. Are current antivirus programs able to detect complex metamorphic malware? An empirical evaluation. , 2009 .