Research on the technology of concealing the character of binary codes based on equal transposition
暂无分享,去创建一个
[1] Shari Lawrence Pfleeger,et al. Security in Computing, 4th Edition , 2006 .
[2] Charles P. Pfleeger,et al. Security in computing , 1988 .
[3] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[4] Salvatore J. Stolfo,et al. Fileprint analysis for Malware Detection 1 , 2005 .
[5] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[6] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[7] Ding Shan. On the Location of Character Code of Trojan , 2007 .