메뉴 건너뛰기




Volumn , Issue , 2006, Pages 73-78

Using engine signature to detect metamorphic malware

Author keywords

Metamorphic engine; Virus scanner

Indexed keywords

METAMORPHIC ENGINES; VIRUS SCANNERS;

EID: 34547172114     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179542.1179558     Document Type: Conference Paper
Times cited : (52)

References (10)
  • 2
    • 34547189367 scopus 로고    scopus 로고
    • Chess, D. M., and White, S. R. An Undetectable Computer Virus. In Proceedings of Virus Bulletin Conference (2000).
    • Chess, D. M., and White, S. R. An Undetectable Computer Virus. In Proceedings of Virus Bulletin Conference (2000).
  • 3
    • 0024682488 scopus 로고
    • Computational Aspects of Computer Viruses
    • Cohen, F. Computational Aspects of Computer Viruses. Computers & Security, 8 (1989), 325-344.
    • (1989) Computers & Security , vol.8 , pp. 325-344
    • Cohen, F.1
  • 6
    • 1842441772 scopus 로고    scopus 로고
    • Authorship Analysis: Identifying The Author of a Program
    • Technical Report 96-052
    • Krsul, I., Spafford, E. H. Authorship Analysis: Identifying The Author of a Program. Technical Report 96-052, 1996.
    • (1996)
    • Krsul, I.1    Spafford, E.H.2
  • 8
    • 0037269111 scopus 로고    scopus 로고
    • Reliable Identification of Bounded-Length Viruses is NP-Complete
    • Spinellis, D. Reliable Identification of Bounded-Length Viruses is NP-Complete. IEEE Transactions on Information Theory, 49, 1 (2003), 280-284.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.1 , pp. 280-284
    • Spinellis, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.