Sciweavers

151 search results - page 17 / 31
» Semantics-Aware Malware Detection
Sort
View
SAC
2010
ACM
14 years 6 months ago
Detecting metamorphic malwares using code graphs
Jusuk Lee, Kyoochang Jeong, Heejo Lee
ACSAC
2005
IEEE
15 years 5 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
DAGSTUHL
2006
15 years 1 months ago
The Software Similarity Problem in Malware Analysis
In software engineering contexts software may be compared for similarity in order to detect duplicate code that indicates poor design, and to reconstruct evolution history. Malicio...
Andrew Walenstein, Arun Lakhotia
ESORICS
2011
Springer
13 years 11 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller