Publisher
Springer Nature Switzerland
Reference29 articles.
1. Alam, S., Horspool, R.N., Traore, I.: Mail: Malware analysis intermediate language: a step towards automating and optimizing malware detection. In: Proceedings of the 6th International Conference on Security of Information and Networks, pp. 233–240 (2013)
2. Alvarez, V.M.: Yara. https://virustotal.github.io/yara/
3. Bonfante, G., Kaczmarek, M., Marion, J.Y.: Control flow graphs as malware signatures. In: International workshop on the Theory of Computer Viruses (2007)
4. Bruschi, D., Martignoni, L., Monga, M.: Code normalization for self-mutating malware. IEEE Secur. Privacy 5(2), 46–54 (2007)
5. Cesare, S., Xiang, Y.: Malware variant detection using similarity search over sets of control flow graphs. In: 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 181–189 (2011). https://doi.org/10.1109/TrustCom.2011.26