Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
暂无分享,去创建一个
[1] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[2] Suhaimi Ibrahim,et al. Camouflage in Malware: from Encryption to Metamorphism , 2012 .
[3] Nhat-Phuong Tran,et al. High performance string matching for security applications , 2013, International Conference on ICT for Smart Society.
[4] Peter Szor,et al. HUNTING FOR METAMORPHIC , 2001 .
[5] Paul A. Watters,et al. Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures , 2011, AusDM.
[6] Subariah Ibrahim,et al. Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Tree , 2011 .
[7] A.H. Sung,et al. Polymorphic malicious executable scanner by API sequence analysis , 2004, Fourth International Conference on Hybrid Intelligent Systems (HIS'04).
[8] Joohan Lee,et al. A survey of data mining techniques for malware detection using file features , 2008, ACM-SE 46.
[9] Philippe Beaucamps. Advanced Polymorphic Techniques , 2007 .
[10] Mark Stamp,et al. Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach , 2013, 2013 46th Hawaii International Conference on System Sciences.
[11] Eoghan Casey,et al. Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems , 2013 .
[12] Lior Rokach,et al. Detection of unknown computer worms based on behavioral classification of the host , 2008, Comput. Stat. Data Anal..
[13] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[14] Suhaimi Ibrahim,et al. Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey , 2011, ArXiv.
[15] Richard Stone. A call to cyber arms. , 2013, Science.
[16] Jian Xu,et al. A similarity metric method of obfuscated malware using function-call graph , 2012, Journal of Computer Virology and Hacking Techniques.
[17] Guido Bertoni,et al. Keccak sponge function family main document , 2009 .
[18] John C. S. Lui,et al. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[19] Abhishek Shah,et al. Approximate Disassembly using Dynamic Programming , 2010 .
[20] Mark Stamp,et al. Hunting for metamorphic engines , 2006, Journal in Computer Virology.
[21] Mark Stamp,et al. Chi-squared distance and metamorphic virus detection , 2013, Journal of Computer Virology and Hacking Techniques.