메뉴 건너뛰기




Volumn 7, Issue 2, 2011, Pages 107-119

Malware detection using assembly and API call sequences

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; ANTIVIRUS SOFTWARES; API CALLS; ASSEMBLY FUNCTIONS; DETECTION ALGORITHM; DETECTION PERFORMANCE; EXECUTABLES; FALSE POSITIVE; INFORMATION ASSURANCE; MALICIOUS CODES; MALWARE DETECTION; MALWARES; MATRIX; METAMORPHIC VERSIONS; NETWORK FUNCTIONS; QUANTITATIVE MEASURES; SIMILARITY ANALYSIS; SIMILARITY MEASURE; SIMILARITY SCORES; SOURCE CODES; STATIC ANALYZERS;

EID: 79955114244     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-010-0141-5     Document Type: Article
Times cited : (93)

References (11)
  • 3
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Hofmeyr S. A., Somayaji A., Forrest S.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151-180 (1998).
    • (1998) J. Comput. Secur. , vol.6 , pp. 151-180
    • Hofmeyr, S.A.1    Somayaji, A.2    Forrest, S.3
  • 4
    • 79955110167 scopus 로고    scopus 로고
    • Building an intrusion-detection system to detect suspicious process behavior
    • Wespi, A., Debar, H.: Building an intrusion-detection system to detect suspicious process behavior. Rec. Adv. Intrusion Detect. (1999).
    • (1999) Rec. Adv. Intrusion Detect
    • Wespi, A.1    Debar, H.2
  • 5
    • 84944248021 scopus 로고    scopus 로고
    • Intrusion Detection Using Variable-Length Audit Trail Patterns
    • Wespi, A., Dacier, M., Debar, H.: Intrusion Detection Using Variable-Length Audit Trail Patterns. Rec. Adv. Intrusion Detect. 110-129 (2000).
    • (2000) Rec. Adv. Intrusion Detect , pp. 110-129
    • Wespi, A.1    Dacier, M.2    Debar, H.3
  • 7
    • 79955111895 scopus 로고    scopus 로고
    • Dictionary November 2005
    • Dictionary, http://dictionary. reference. com/search?q=obfuscation, November 2005.
  • 8
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation-tools for software protection
    • August
    • Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Transactions on Software Engineering, pp. 701-746, August 2002.
    • (2002) IEEE Transactions on Software Engineering , pp. 701-746
    • Collberg, C.1    Thomborson, C.2
  • 11
    • 0031755126 scopus 로고    scopus 로고
    • Activity Pattern Analysis by means of Sequence-Alignment Methods
    • Wilson W. C.: Activity Pattern Analysis by means of Sequence-Alignment Methods. J. Environ. Plan. 30, 1017-1038 (1998).
    • (1998) J. Environ. Plan. , vol.30 , pp. 1017-1038
    • Wilson, W.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.