Statistical signatures for fast filtering of instruction-substituting metamorphic malware
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. Authorship analysis: identifying the author of a program , 1997, Comput. Secur..
[2] S. Katzenbeisser,et al. Malware Normalization , 2005 .
[3] Arun Lakhotia,et al. ARE METAMORPHIC VIRUSES REALLY INVINCIBLE ? PART 1 , 2004 .
[4] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[5] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] Arun Lakhotia,et al. Using engine signature to detect metamorphic malware , 2006, WORM '06.
[7] Mattia Monga,et al. Using Code Normalization for Fighting Self-Mutating Malware , 2006, ISSSE.
[8] Arun Lakhotia,et al. Imposing order on program statements to assist anti-virus scanners , 2004, 11th Working Conference on Reverse Engineering.
[9] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[10] Salvatore J. Stolfo,et al. Towards Stealthy Malware Detection , 2007, Malware Detection.
[11] Arun Lakhotia,et al. CHALLENGES IN GETTING ‘FORMAL’ WITH VIRUSES , 2003 .
[12] Andrew Walenstein,et al. Normalizing Metamorphic Malware Using Term Rewriting , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.
[13] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[14] Mohamed R. Chouchane,et al. The Design Space of Metamorphic Malware , 2007 .