Analysis of Adversarial Code: Problem, Challenges, Results
暂无分享,去创建一个
[1] Arun Lakhotia,et al. CHALLENGES IN GETTING ‘FORMAL’ WITH VIRUSES , 2003 .
[2] Andrew Walenstein,et al. Malware Phylogeny Using Maximal πPatterns , 2005 .
[3] Arun Lakhotia,et al. Analyzing Memory Accesses in Obfuscated x86 Executables , 2005, DIMVA.
[4] Arun Lakhotia,et al. A method for detecting obfuscated calls in malicious binaries , 2005, IEEE Transactions on Software Engineering.
[5] Andrew Walenstein,et al. Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.
[6] Arun Lakhotia,et al. Are Metamorphic Viruses Really Invincible? , 2022 .