Author:
Bonfante Guillaume,Kaczmarek Matthieu,Marion Jean-Yves
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Reference20 articles.
1. http://udis86.sourceforge.net
2. http://vx.netlux.org
3. http://www.clamav.net
4. Beaucamps Ph., Filiol E.: On the possibility of practically obfuscating programs towards a unified perspective of code protection. J. Comput. Virol. 3(1), 3–21 (2007)
5. Bonfante, G., Kaczmarek, M., Marion, J.Y.: Control Flow Graphs as Malware Signatures. WTCV, May (2007)
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A New Framework for Visual Classification of Multi-Channel Malware Based on Transfer Learning;Applied Sciences;2023-02-15
2. Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis;Lecture Notes in Computer Science;2023
3. Register Automata for Malware Specification;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23
4. Detection of malware using an artificial neural network based on adaptive resonant theory;Prikladnaya Diskretnaya Matematika;2021
5. From Image to Code;Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence;2020-04-23