共 20 条
- [1] Sathyanarayan V., Kohli P., Bruhadeshwar B., Signature generation and detection of malware families, In Information Security and Privacy, pp. 336-349, (2008)
- [2] Burguera I., Zurutuza U., Nadjm-Tehrani S., Crowdroid: Behavior-based malware detection system for Android, In Proceedings of the 1st ACM Workshop On Security and Privacy In Smartphones and Mobile Devices, pp. 15-26, (2011)
- [3] Polychronakis M., Anagnostakis K.G., Markatos E.P., Emulation-based detection of non-self-contained polymorphic shellcode, In Proceedings of the 10th International Conference On Recent Advances In Intrusion Detection, pp. 87-106, (2007)
- [4] Linn C., Debray S., Obfuscation of executable code to improve resistance to static disassembly, In Proceedings of the 10th ACM Conference On Computer and Communications Security, pp. 290-299, (2003)
- [5] Snow K.Z., Krishnan S., Monrose F., Provos N., ShellOS: Enabling fast detection and forensic analysis of code injection attacks, In Proceedings of the 20th USENIX Security Symposium, (2011)
- [6] Song D., Brumley D., Yin H., Caballero J., Jager I., Kang M., Liang Z., Newsome J., Poosankam P., Saxena P., BitBlaze: A new approach to computer security via binary analysis, Inf. Syst. Secur, pp. 1-25, (2008)
- [7] Kirda E., Kruegel C., Banks G., Vigna G., Kemmerer R., Behavior-based spyware detection, In Usenix Security Symposium, 15, (2006)
- [8] Fratantonio Y., Kruegel C., Vigna G., Shellzer: A tool for the dynamic analysis of malicious shellcode, In Recent Advances In Intrusion Detection, pp. 61-80, (2011)
- [9] Sharif M., Lanzi A., Giffin J., Lee W., Impeding malware analysis using conditional code obfuscation, In Network and Distributed System Security (NDSS), (2008)
- [10] Skoudis E., Zeltser L., Malware: Fighting Malicious Code, (2004)