Author:
David Baptiste,Filiol Eric,Gallienne Kévin
Funder
This research work has been partially funded by the National Fund for the Digital Society
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference6 articles.
1. David, B., Filiol , E., Gallienne, K.: Heuristic and proactive IAT/EAT-based detection module of unknown malware. In: Proceedings of the European Conference on Information Warfare and Security (ECCWS’16), Germany (2016)
2. Das, S.: Mz = zm? (2008). http://winprogger.com/?p=53 . Accessed 16 Apr 2014
3. Dechaux, J., Filiol, E.: Proactive defense against malicious documents. Formalization, implementation and case studies. J. Comput. Virol. Hacking Tech. (2016). (To appear. Special Issue on Knowledge-based System and Security, Roy Park Editor)
4. Ferrand, O., Filiol, E.: Combinatorial detection of malware by IAT discrimination. J. Comput. Virol. Hacking Tech. 12(3) (2016). doi: 10.1007/s11416-015-0257-8
5. Microsoft: Microsoft PE and COFF specification (2013). http://msdn.microsoft.com/en-us/library/gg463119.aspx . Accessed 16 Apr 2014
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献