Author:
Akabane Shu,Okamoto Takeshi
Reference27 articles.
1. Zscaler (2020) “Zscaler annual IoT report identifies shift in shadow IoT behavior threatening enterprise security posture” https://www.zscaler.com/press/zscaler-released-second-annual-iot-report-2020/
2. E Cozzi, M Graziano, Y Fratantonio, and D Balzarotti. (2018) “Understanding Linux malware,” IEEE Symposium on Security and Privacy, pp.161-175.
3. I Arijan, and O Yoshihiro. (2021) “Comparison between image based and system call based methods for classification of IoT malware,” CSEC92, pp. 1-8.
4. M von Tschirschnitz. (2018) “Library and function identification by optimized pattern matching on compressed databases: A close to perfect identification of known code snippets,” Proceedings of the 2nd Reversing and Offensive-oriented Trends Symposium, pp.1-12.
5. Hex-Rays (2015) “IDA F.L.I.R.T. technology: in-depth,” https://www.hex-rays.com/products/ida/tech/flirt/in_depth/.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Xunpack: Cross-Architecture Unpacking for Linux IoT Malware;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16
2. The Current State of Research on Malware Written in the Rust Programming Language;2023 International Conference on Information Technology (ICIT);2023-08-09