Sciweavers

6 search results - page 2 / 2
» Static Verification of Worm and virus Behavior in binary Exe...
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 10 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...