Catching the Behavioral Differences between Multiple Executions for Malware Detection
暂无分享,去创建一个
Tsutomu Matsumoto | Daisuke Inoue | Katsunari Yoshioka | Takahiro Kasama | Tsutomu Matsumoto | K. Yoshioka | D. Inoue | Takahiro Kasama
[1] Tsutomu Matsumoto,et al. Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems , 2011, J. Inf. Process..
[2] Lei Wu,et al. Honeypot detection in advanced botnet attacks , 2010, Int. J. Inf. Comput. Secur..
[3] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[4] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[5] Koji Nakao,et al. Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities , 2009, IEICE Trans. Inf. Syst..
[6] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[7] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[8] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .