Morphological detection of malware
暂无分享,去创建一个
Guillaume Bonfante | Jean-Yves Marion | Matthieu Kaczmarek | J. Marion | Guillaume Bonfante | M. Kaczmarek
[1] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[2] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[3] Somesh Jha,et al. A semantics-based approach to malware detection , 2007, POPL '07.
[4] Andrew Walenstein,et al. Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[5] Eric Filiol,et al. Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.
[6] Stefan Katzenbeisser,et al. Software transformations to improve malware detection , 2007, Journal in Computer Virology.
[7] Hubert Comon,et al. Tree automata techniques and applications , 1997 .
[8] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[9] Guillaume Bonfante,et al. Control Flow Graphs as Malware Signatures , 2007 .
[10] Éric Filiol. Computer Viruses: from Theory to Applications , 2005 .
[11] Eric Filiol,et al. Malware Pattern Scanning Schemes Secure Against Black-box Analysis , 2006, Journal in Computer Virology.
[12] Mattia Monga,et al. Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.
[13] Eric Filiol,et al. On the possibility of practically obfuscating programs towards a unified perspective of code protection , 2007, Journal in Computer Virology.