Author:
Yan Fei,Xing Yunlong,Zhang Shiwei,Yue Zhihan,Zheng Yamin
Reference11 articles.
1. Traynor, P., Chien, M., Weaver, S., et al.: Noninvasive methods for host certification. ACM Trans. Inf. Syst. Secur. (TISSEC) 11(3), 16 (2008)
2. Chen, X., Andersen, J., Mao, Z.M., et al.: Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In: 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC, DSN 2008, pp. 177–186. IEEE (2008)
3. Maiorca, D., Corona, I., Giacinto, G.: Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious pdf files detection. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 119–130. ACM (2013)
4. Jana, S., Shmatikov, V.: Abusing file processing in malware detectors for fun and profit. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 80–94. IEEE (2012)
5. Marpaung, J.A.P., Sain, M., Lee, H.J.: Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp. 744–749. IEEE (2012)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01