Mining control flow graph as API call-grams to detect portable executable malware
Present day malware shows stealthy and dynamic capability and avails administrative rights
to control the victim computers. Malware writers depend on evasion techniques like code …
to control the victim computers. Malware writers depend on evasion techniques like code …
[PDF][PDF] Mining Control Flow Graph as API Call-grams to Detect Portable Executable Malware
P Faruki, V Laxmi, MS Gaur, P Vinod - 2012 - researchgate.net
Present day malware shows stealthy and dynamic capability and avails administrative rights
to control the victim computers. Malware writers depend on evasion techniques like code …
to control the victim computers. Malware writers depend on evasion techniques like code …
[引用][C] Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod - Proceedings of the Fifth …, 2012 - cir.nii.ac.jp
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware |
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ …
CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ …