Author:
Ferrand Olivier,Filiol Eric
Funder
Fonds national pour la Société Numérique (FSN)
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference14 articles.
1. Wicherski, G.: peHash: a novel approach to fast malware clustering. In: Proceedins of the 2nd usenix workshop on large-scale exploits and emergent threats (2009)
2. Griffin, K., Schneider, S., Hu, X., Chiueh, T.: Automatic generation of string signatures for malware detection. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) Recent advances in intrusion detection 2009. Lecture Notes in Computer Science 5758. pp. 101–120. Springer, Berlin (2009)
3. Bruschi, D., Martignoni, L., Monga, M.: Code normalization for self-mutating malware. IEEE Secur. Priv. 5(2), 46–54 (2007)
4. Bilar, D.: Opcodes as predicators for malware. Int. J. Electron. Secur. Digit. Forensics 1(2), 156–168 (2007)
5. Perdisci, R., Lanzi, A., Lee, W.: McBoost, boosting scalability in malware collection and analysis using statistical classification of executables. In: IEEE annual computer security applications conference (ACSAC), pp. 301–310 (2008)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Proactive Detection of Unknown Binary Executable Malware;Advances in Security in Computing and Communications;2017-07-19
2. Knowledge-based System and Security;Journal of Computer Virology and Hacking Techniques;2016-05-11
3. Structural analysis of binary executable headers for malware detection optimization;Journal of Computer Virology and Hacking Techniques;2016-04-28