Malware Normalization
暂无分享,去创建一个
[1] H. Read,et al. Metamorphism , 1940, Nature.
[2] Jean-Pierre Jouannaud,et al. Rewrite Systems , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.
[3] Wolfgang Thomas,et al. Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics , 1990 .
[4] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .
[5] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[6] Christian S. Collberg,et al. Breaking abstractions and unstructuring data structures , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[7] Susan Horwitz,et al. Semantics-preserving procedure extraction , 2000, POPL '00.
[8] Gary McGraw,et al. Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.
[9] Yuan Xiang Gu,et al. An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs , 2001, ISC.
[10] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[11] Gregory Wroblewski,et al. General Method of Program Code Obfuscation , 2002 .
[12] Mohammad Hossain Heydari,et al. Content based file type detection algorithms , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[13] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[14] Sanjit A. Seshia,et al. The UCLID Decision Procedure , 2004, CAV.
[15] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[16] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[17] Stefan Katzenbeisser,et al. Detecting Malicious Code by Model Checking , 2005, DIMVA.
[18] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[19] Andrew Walenstein,et al. An Approach towards Disassembly of Malicious Binary Executables , 2005 .
[20] Saumya K. Debray,et al. Deobfuscation: reverse engineering obfuscated code , 2005, 12th Working Conference on Reverse Engineering (WCRE'05).
[21] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[22] Ke Wang,et al. Fileprints: identifying file types by n-gram analysis , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[23] Stephanie Wehner,et al. Analyzing worms and network traffic using compression , 2005, J. Comput. Secur..