共 17 条
[1]
On the possibility of practically obfuscating programs towards a unified perspective of code protection
[J].
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2007, 3 (01)
:3-21
[2]
BONFANTE G, 2007, CONTROL FLOW GRAPHS
[3]
Bruschi D., 2006, TECHNICAL REPORT
[4]
Semantics-aware malware detection
[J].
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2005,
:32-46
[5]
Christodorescu M., 2004, Software Engineering Notes, V29, P34, DOI 10.1145/1013886.1007518
[6]
Software transformations to improve malware detection
[J].
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES,
2007, 3 (04)
:253-265
[7]
Comon H., 1997, TREE AUTOMATA TECHNI, V10
[8]
Dalla Preda M., 2007, POPL 07
[9]
Filiol E., 2006, 15TH EICAR
[10]
Filiol E., 2005, COMPUTER VIRUSES FRO