Author:
Bueno Denis,Compton Kevin J.,Sakallah Karem A.,Bailey Michael
Publisher
Springer Berlin Heidelberg
Reference54 articles.
1. Royal, P., Halpin, M., Dagon, D., Edmonds, R., Lee, W.: PolyUnpack: Automating the hidden-code extraction of unpack-executing malware. In: Annual Computer Security Applications Conference, pp. 289–300. IEEE Computer Society (2006)
2. Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., Bryant, R.E.: Semantics-aware malware detection. In: Security and Privacy, pp. 32–46. IEEE Computer Society Press (2005)
3. Oppliger, R., Rytz, R.: Does trusted computing remedy computer security problems? IEEE Security Privacy 3(2), 16–19 (2005)
4. Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Song, D.X., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Botnet Detection, pp. 65–88. Springer (2008)
5. Newsome, J., Brumley, D., Franklin, J., Song, D.: Replayer: automatic protocol replay by binary analysis. In: ACM Conference on Computer and Communications Security, CCS 2006, pp. 311–321. ACM, New York (2006)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features;Proceedings 2020 Network and Distributed System Security Symposium;2020
2. Towards Paving the Way for Large-Scale Windows Malware Analysis;Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security;2018-01-15
3. Theoretical Foundation;The Huawei and Snowden Questions;2018