|
Volumn , Issue , 2003, Pages 76-82
|
Detection of injected, dynamically generated, and obfuscated malicious code
|
Author keywords
Anomaly detection; Code analysis; Dynamic analysis; Execution monitoring; Intrusion detection; Malicious code detection; Static analysis; System calls
|
Indexed keywords
CODES (SYMBOLS);
COMPUTER NETWORKS;
COMPUTER OPERATING SYSTEMS;
COMPUTER SOFTWARE;
COMPUTER VIRUSES;
FINITE AUTOMATA;
INTEROPERABILITY;
MATHEMATICAL MODELS;
PROGRAM COMPILERS;
SECURITY OF DATA;
ANOMALY DETECTIONS;
CODE ANALYSIS;
DYNAMIC ANALYSIS;
EXECUTION MONITORING;
INTRUSION DETECTIONS;
MALICIOUS CODE DETECTION;
STATIC ANALYSIS;
SYSTEM CALLS;
SOFTWARE ENGINEERING;
|
EID: 18844437024
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/948187.948201 Document Type: Conference Paper |
Times cited : (67)
|
References (15)
|