共 29 条
- [1] 代码复用攻击与防御技术研究[D]. 陈平.南京大学 2012
- [3] Live DM:Temporal mapping of dynamic kernel memory for dynamic kernel malware analysis and debugging. Rhee J,Xu D. Technical Report 2010-02.Purdue University at West Lafayette . 2010
- [4] Dynamic detection of process-hiding kernel rootkit. Xu L,Su Z. Technical Report,CSE-2009-24,University of California at Davis . 2009
- [5] A semantic-based malware detection system design based on channels. Ren P,Wang X,Wu C,Zhao B,Sun H. Information And Communication Technology . 2014
- [6] Obfuscated malicious code detection with path condition analysis [J]. Journal of Networks, 2014, 9 (05) : 1208 - 1214
- [10] Comprehensive and Efficient Protection of Kernel Control Data. Jinku Li,Zhi Wang,Tyler Bletsch,Deepa Srinivasan,Michael Grace,Xuxian Jiang. IEEE Transactions on Information Forensics and Security . 2011