-
1
-
-
34548223126
-
A semantics-based approach to malware detection
-
DOI 10.1145/1190216.1190270, Conference Record of POPL 2007: The 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - Papers Presented at the Symposium
-
M. D Preda., M. Christodorescu, S. Jha, and S. Debray, A Semantics-Based Approach to Malware Detection, POPL'07 Nice, France: ACM, 2007, pp. 377-388. (Pubitemid 47326563)
-
(2007)
Conference Record of the Annual ACM Symposium on Principles of Programming Languages
, pp. 377-388
-
-
Preda, M.D.1
Christodorescu, M.2
Jha, S.3
Debray, S.4
-
2
-
-
84963961440
-
Detecting obfuscated viruses using cosine similarity analysis
-
Phuket: IEEE Computer Society
-
A. Karnik, S. Goswami, and R. Guha, Detecting Obfuscated Viruses Using Cosine Similarity Analysis, First Asia International Conference on Modelling & Simulation (AMS'07), Phuket: IEEE Computer Society, 2007, pp. 165 - 170.
-
(2007)
First Asia International Conference on Modelling & Simulation (AMS'07)
, pp. 165-170
-
-
Karnik, A.1
Goswami, S.2
Guha, R.3
-
5
-
-
70349503911
-
-
Master Thesis, Royal Holloway, University of London, Department of Mathematics, Egham, England
-
E. Konstantinou, Metamorphic Virus: Analysis and Detection. Master Thesis, Royal Holloway, University of London, Department of Mathematics, Egham, England, 2008.
-
(2008)
Metamorphic Virus: Analysis and Detection
-
-
Konstantinou, E.1
-
6
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
J.-M. Borello, and L. Me, Code obfuscation techniques for metamorphic viruses. Journal of Computer Virology, 2008, pp. 211-220.
-
(2008)
Journal of Computer Virology
, pp. 211-220
-
-
Borello, J.-M.1
Me, L.2
-
7
-
-
78651067505
-
-
Master Thesis, San Jose State University, Department of Computer Science, San Jose, CA
-
P. Desai, Towards An Uudetectable Computer Virus, Master Thesis, San Jose State University, Department of Computer Science, San Jose, CA., 2008.
-
(2008)
Towards an Uudetectable Computer Virus
-
-
Desai, P.1
-
8
-
-
14344254800
-
Hunting for metamorphic
-
Abingdon, England
-
P. Szor, and P. Ferrie, Hunting for metamorphic. Virus Bulletin Conference, Abingdon, England, 2001, pp. 123-144.
-
(2001)
Virus Bulletin Conference
, pp. 123-144
-
-
Szor, P.1
Ferrie, P.2
-
9
-
-
70449429139
-
Computer virus strategies and detection methods
-
E. Al Daoud, I. H. Jebril, and & B. Zaqaibeh, Computer Virus Strategies and Detection Methods. Int. J. Open Problems Compt. Math., Vol. 1, No. 2, 2008, pp. 29-36.
-
(2008)
Int. J. Open Problems Compt. Math.
, vol.1
, Issue.2
, pp. 29-36
-
-
Al Daoud, E.1
Jebril, I.H.2
Zaqaibeh, B.3
-
10
-
-
33751196771
-
Detection of metamorphic computer viruses using algebraic specification
-
DOI 10.1007/s11416-006-0023-z
-
M. Webster, and G. Malcolm, Detection Of Metamorphic Computer Viruses Using Algebraic Specification, Journal of Computer Virology, Springer, Vol 2, 2006, pp. 149-161. (Pubitemid 44777785)
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.3
, pp. 149-161
-
-
Webster, M.1
Malcolm, G.2
-
13
-
-
0003482546
-
-
PhD Thesis, Columbia University, New York, N.Y.
-
J. Smith, Integrated Spatial and Feature Image Systems: Retrieval, Analysis and Compression. PhD Thesis, Columbia University, New York, N.Y., 1997.
-
(1997)
Integrated Spatial and Feature Image Systems: Retrieval, Analysis and Compression
-
-
Smith, J.1
-
14
-
-
79958730036
-
-
Available at
-
Mathworks Products & Services. Available at http://www.mathworks.com/ products
-
-
-
-
15
-
-
79958708666
-
-
Availabe at
-
VX Heavens Computer virus collection. Availabe at http://vx.netlux.org
-
-
-
|