Author:
Honap Amrita Milind,Lee Wonjun
Publisher
Springer International Publishing
Reference31 articles.
1. Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 231–245 (2007)
2. Rad, B.B., Masrom, M., Ibrahim, S.: Camouflage in Malware: from Encryption to Metamorphism. University Technology Malaysia
3. Kruegel, C., Robertson, W., Vigna, G.: Detecting kernel-level rootkits through binary analysis. In: Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC 2004, Santa Barbara, pp. 91–100 (2004). Technical University Vienna, Reliable Software Group University of California
4. Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to RISC (2008). Department of Computer Science and Engineering, University of California, San Diego, California
5. Konstantinou, E.: Metamorphic virus: analysis and detection. Technical report RHUL-MA-2008-02, Department of Mathematics Royal Holloway, University of London Egham, 15 January 2008
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. TGRop: Top Gun of Return-Oriented Programming Automation;Lecture Notes in Computer Science;2024
2. Review of Stack-Based Binary Exploitation Techniques;Proceedings of Emerging Trends and Technologies on Intelligent Systems;2021-10-02
3. Object Scanning of Windows Kernel Driver Based on Pool Tag Quick Scanning;Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University;2019-10