Mining malware secrets
暂无分享,去创建一个
[1] Priya Narasimhan,et al. Binary Function Clustering Using Semantic Hashes , 2012, 2012 11th International Conference on Machine Learning and Applications.
[2] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[3] Arun Lakhotia,et al. Fast location of similar code fragments using semantic 'juice' , 2013, PPREW '13.
[4] Xiaohong Su,et al. Using Reduced Execution Flow Graph to Identify Library Functions in Binary Code , 2016, IEEE Transactions on Software Engineering.
[5] Debin Gao,et al. BinHunt: Automatically Finding Semantic Differences in Binary Programs , 2008, ICICS.
[6] Arun Lakhotia,et al. Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables , 2015, POPL.
[7] Paul Black,et al. Anti-analysis trends in banking malware , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).
[8] Somesh Jha,et al. A semantics-based approach to malware detection , 2008, TOPL.
[9] Arun Lakhotia,et al. VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[10] Johannes Bader,et al. A Comprehensive Measurement Study of Domain Generating Malware , 2016, USENIX Security Symposium.
[11] T. Dullien,et al. Graph-based comparison of Executable Objects ( English Version ) , 2005 .
[12] Andrew Walenstein,et al. The Software Similarity Problem in Malware Analysis , 2006, Duplication, Redundancy, and Similarity in Software.