Metamorphic Malware Detection using Subgraph Matching
暂无分享,去创建一个
Heejo Lee | Jehyun Lee | Hyun-Cheol Jeong | Jong-Hoon Kwon | Heejo Lee | Hyuncheol Jeong | Jonghoon Kwon | Jehyun Lee
[1] Jau-Hwang Wang,et al. Virus detection using data mining techinques , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[2] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[3] Mattia Monga,et al. Code Normalization for Self-Mutating Malware , 2007, IEEE Security & Privacy.
[4] Andrew Walenstein,et al. Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[5] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[6] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[7] Steve R. White,et al. An Undetectable Computer Virus , 2000 .
[8] Somesh Jha,et al. A semantics-based approach to malware detection , 2008, TOPL.
[9] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[10] David M. Nicol,et al. The Koobface botnet and the rise of social malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[11] Eric Filiol,et al. Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.
[12] Robert Lyda,et al. Using Entropy Analysis to Find Encrypted and Packed Malware , 2007, IEEE Security & Privacy.
[13] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[14] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[17] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[18] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[19] Bezawada Bruhadeshwar,et al. Signature Generation and Detection of Malware Families , 2008, ACISP.
[20] Carey Nachenberg,et al. Computer virus-antivirus coevolution , 1997, Commun. ACM.
[21] Heejo Lee,et al. Generic unpacking using entropy analysis , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[22] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..