An Executable File Encryption Based Scheme for Malware Defense
暂无分享,去创建一个
Min Wu | Chengua Yan | Chengua Yan | Min Wu
[1] Gary McGraw,et al. Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.
[2] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[3] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[4] Walter Oney,et al. Programming the Microsoft Windows Driver Model , 1999 .
[5] Ravishankar K. Iyer,et al. Security Vulnerabilities - From Data Analysis to Protection Mechanisms , 2003, 2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.
[6] Shen Changxiang,et al. A Security Enhancement Architecture for COTS Operating System , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[7] John D. McLean,et al. Is The Trusted Computing Base Concept Fundamentally Flawed? , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.