Learning from Big Malwares
暂无分享,去创建一个
Yiying Zhang | Wenfei Wu | Linhai Song | Heqing Huang | Wu Zhou | Yiying Zhang | Wenfei Wu | Linhai Song | Heqing Huang | Wu Zhou
[1] Paul Barford,et al. An empirical study of malware evolution , 2009, 2009 First International Communication Systems and Networks and Workshops.
[2] Camil Demetrescu,et al. Mining hot calling contexts in small space , 2011, PLDI '11.
[3] Andreas Krause,et al. Predicting Program Properties from "Big Code" , 2015, POPL.
[4] Eran Yahav,et al. Programming with "Big Code" , 2015, Found. Trends Program. Lang..
[5] Martin T. Vechev,et al. Programming with "Big Code": Lessons, Techniques and Applications , 2015, SNAPL.
[6] Eran Yahav,et al. Code completion with statistical language models , 2014, PLDI.
[7] Martin T. Vechev,et al. Phrase-Based Statistical Translation of Programming Languages , 2014, Onward!.
[8] Divyakant Agrawal,et al. An integrated efficient solution for computing frequent and top-k elements in data streams , 2006, TODS.
[9] Andreas Zeller,et al. Predicting faults from cached history , 2008, ISEC '08.
[10] Leyla Bilge,et al. Needles in a Haystack: Mining Information from Public Dynamic Analysis Sandboxes for Malware Intelligence , 2015, USENIX Security Symposium.
[11] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.