-
1
-
-
34047173968
-
-
P. Ször and P. Ferrie, Hunting for Metamorphic, Proc. Virus Bulletin Conf., Virus Bulletin, 2001, pp. 123-144.
-
P. Ször and P. Ferrie, "Hunting for Metamorphic," Proc. Virus Bulletin Conf., Virus Bulletin, 2001, pp. 123-144.
-
-
-
-
3
-
-
84924223669
-
Static Analysis of Executables to Detect Malicious Patterns
-
Usenix Assoc
-
M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns," Proc. Usenix Security Symposium, Usenix Assoc., 2003, pp. 169-186.
-
(2003)
Proc. Usenix Security Symposium
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
4
-
-
34047097266
-
-
D.M. Chess and S.P. White, An Undetectable Computer Virus, Proc. Virus Bulletin Conf., Virus Bulletin, 2000; www.research.ibm.com/ antivirus/SciPapers/VB2000DC.htm.
-
D.M. Chess and S.P. White, "An Undetectable Computer Virus," Proc. Virus Bulletin Conf., Virus Bulletin, 2000; www.research.ibm.com/ antivirus/SciPapers/VB2000DC.htm.
-
-
-
-
6
-
-
0004046658
-
A Taxonomy of Obfuscating Transformations
-
Dept. of Computer Science, Univ. of Auckland, July
-
C. Collberg, C. Thomborson, and D Low, A Taxonomy of Obfuscating Transformations, tech. report 148, Dept. of Computer Science, Univ. of Auckland, July 1997.
-
(1997)
tech. report
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
34047145867
-
Are Metamorphic Viruses Really Invincible?
-
Dec
-
A. Lakhotia, A. Kapoor, and E.U. Kumar, "Are Metamorphic Viruses Really Invincible?" Virus Bulletin, Dec. 2004, pp. 5-7.
-
(2004)
Virus Bulletin
, pp. 5-7
-
-
Lakhotia, A.1
Kapoor, A.2
Kumar, E.U.3
-
9
-
-
0000162467
-
Compiler Techniques for Code Compaction
-
S.K. Debray et al., "Compiler Techniques for Code Compaction," ACM Trans. Programming Languages and Systems, vol. 22, no. 2, 2000, pp. 378-415.
-
(2000)
ACM Trans. Programming Languages and Systems
, vol.22
, Issue.2
, pp. 378-415
-
-
Debray, S.K.1
-
11
-
-
33846012075
-
-
A.V Aho, R. Sethi, and J.D Ullman, Compilers:, Addison-Wesley
-
A.V Aho, R. Sethi, and J.D Ullman, Compilers: Principles, Techniques and Tools, Addison-Wesley, 1986.
-
(1986)
Principles, Techniques and Tools
-
-
-
12
-
-
0016870630
-
An Algorithm for Subgraph Isomorphism
-
J.R. Ullman, "An Algorithm for Subgraph Isomorphism," J. ACM, vol. 23, no. 1, 1976, pp. 31-42.
-
(1976)
J. ACM
, vol.23
, Issue.1
, pp. 31-42
-
-
Ullman, J.R.1
-
13
-
-
33746389292
-
Polymorphic Worm Detection using Structural Information of Executables
-
Springer
-
C. Kruegel et al., "Polymorphic Worm Detection using Structural Information of Executables," Proc. Int'l Symp. Recent Advances in Intrusion Detcaion, Springer, 2005, pp. 207-226.
-
(2005)
Proc. Int'l Symp. Recent Advances in Intrusion Detcaion
, pp. 207-226
-
-
Kruegel, C.1
-
16
-
-
34047166855
-
Using Code Normalization for Fighting Self-Mutating Malware
-
IEEE CS Press
-
D. Bruschi, L. Martignoni, and M. Monga, "Using Code Normalization for Fighting Self-Mutating Malware," Proc. Int'l Symp. Secure Software Engineering, IEEE CS Press, 2006, pp. 37-44.
-
(2006)
Proc. Int'l Symp. Secure Software Engineering
, pp. 37-44
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
-
17
-
-
4644303571
-
A (Sub)graph Isomorphism Algorithm for Matching Large Graphs
-
L.P. Cordella et al., "A (Sub)graph Isomorphism Algorithm for Matching Large Graphs," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 26, no. 10, 2004, pp. 1367-1372.
-
(2004)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.26
, Issue.10
, pp. 1367-1372
-
-
Cordella, L.P.1
-
18
-
-
33746406796
-
Detecting Self-Mutating Malware Using Control Flow Graph Matching
-
Springer
-
D. Bruschi, L. Martignoni, and M. Monga, "Detecting Self-Mutating Malware Using Control Flow Graph Matching," Proc. Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Springer, 2005, pp. 129-143.
-
(2005)
Proc. Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
, pp. 129-143
-
-
Bruschi, D.1
Martignoni, L.2
Monga, M.3
|