Modeling High-Level Behavior Patterns for Precise Similarity Analysis of Software
暂无分享,去创建一个
Zhendong Su | Taeho Kwon | Z. Su | Taeho Kwon
[1] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] Ziheng Yang. PAML 4: phylogenetic analysis by maximum likelihood. , 2007, Molecular biology and evolution.
[3] Xiangyu Zhang,et al. Matching execution histories of program versions , 2005, ESEC/FSE-13.
[4] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[5] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[6] Zhendong Su,et al. Automatic mining of functionally equivalent code fragments via random testing , 2009, ISSTA.
[7] Jens Stoye,et al. Simple and flexible detection of contiguous repeats using a suffix tree , 2002, Theor. Comput. Sci..
[8] Qinghua Zhang,et al. MetaAware: Identifying Metamorphic Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[9] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.
[10] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[11] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[12] Bjorn De Sutter,et al. Matching Control Flow of Program Versions , 2007, 2007 IEEE International Conference on Software Maintenance.
[13] Jiong Yang,et al. CLUSEQ: efficient and effective sequence clustering , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[14] Rajiv Gupta,et al. Detecting virus mutations via dynamic matching , 2009, 2009 IEEE International Conference on Software Maintenance.
[15] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[16] M. Gouy,et al. Inferring pattern and process: maximum-likelihood implementation of a nonhomogeneous model of DNA sequence evolution for phylogenetic analysis. , 1998, Molecular biology and evolution.
[17] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[18] It Informatics,et al. Kaspersky Anti-Virus , 2010 .
[19] Sencun Zhu,et al. Behavior based software theft detection , 2009, CCS.
[20] David Schuler,et al. A dynamic birthmark for java , 2007, ASE.
[21] Sencun Zhu,et al. Detecting Software Theft via System Call Based Birthmarks , 2009, 2009 Annual Computer Security Applications Conference.