Mining control flow graph as API call-grams to detect portable executable malware

P Faruki, V Laxmi, P Vinod - … of the Fifth International Conference on …, 2012 - dl.acm.org
Present day malware shows stealthy and dynamic capability and avails administrative rights
to control the victim computers. Malware writers depend on evasion techniques like code …

[PDF][PDF] Mining Control Flow Graph as API Call-grams to Detect Portable Executable Malware

P Faruki, V Laxmi, MS Gaur, P Vinod - 2012 - researchgate.net
Present day malware shows stealthy and dynamic capability and avails administrative rights
to control the victim computers. Malware writers depend on evasion techniques like code …

[引用][C] Mining control flow graph as API call-grams to detect portable executable malware

P Faruki, V Laxmi, MS Gaur, P Vinod - Proceedings of the Fifth …, 2012 - cir.nii.ac.jp
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware |
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ …