DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation
暂无分享,去创建一个
[1] Engin Kirda,et al. A View on Current Malware Behaviors , 2009, LEET.
[2] Anja Feldmann,et al. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection , 2006, USENIX Security Symposium.
[3] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[4] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[5] Abhinav Srivastava,et al. System Call API Obfuscation (Extended Abstract) , 2008, RAID.
[6] Somesh Jha,et al. Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors , 2010, 2010 IEEE Symposium on Security and Privacy.
[7] Ming-Yang Kao,et al. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[8] Greg Hoglund,et al. Rootkits: Subverting the Windows Kernel , 2005 .
[9] Christopher Krügel,et al. AccessMiner: using system-centric models for malware protection , 2010, CCS '10.