Detecting malware variants via function-call graph similarity
暂无分享,去创建一个
[1] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[2] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[3] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.
[4] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[5] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[6] Andrew Walenstein,et al. Constructing malware normalizers using term rewriting , 2008, Journal in Computer Virology.
[7] Qinghua Zhang,et al. MetaAware: Identifying Metamorphic Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[8] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[9] Mattia Monga,et al. Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.