Sciweavers

95 search results - page 3 / 19
» The Software Similarity Problem in Malware Analysis
Sort
View
ISSTA
2012
ACM
11 years 8 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
MOBISYS
2008
ACM
14 years 5 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
PASTE
2010
ACM
13 years 11 months ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 4 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
IWPSE
2003
IEEE
13 years 11 months ago
Automatic Categorization Algorithm for Evolvable Software Archive
The number of software systems is increasing at a rapid rate. For example, SourceForge currently has about sixty thousand software systems registered, twenty-two thousand of which...
Shinji Kawaguchi, Pankaj K. Garg, Makoto Matsushit...