共 30 条
- [1] Highlights from 2010 internet security threat report, (2011)
- [2] Highlights from 2012 internet security threat report, (2013)
- [3] Li Y., Zuo Z.H., An overview of object-code obfuscation technologies , Journal of Computer Technology and Development, 17, 4, pp. 125-127, (2007)
- [4] Nataraj L., Karthikeyan S., Jacob G., Et al., Malware images: Visualization and automatic classification , Proceedings of VizSec , (2011)
- [5] Nataraj L., Yegneswaran V., Porras P., Et al., A comparative assessment of malware classification using binary texture analysis and dynamic analysis , Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence , pp. 21-30, (2011)
- [6] Wang R., Feng D.G., Yang Y., Et al., Semantics-based malware behavior signature extraction and detection method , Journal of Software, 23, 2, pp. 378-393, (2012)
- [7] Cogswell B., Russinovich M., Rootkit revealer, (2006)
- [8] Kirda E., Kruegel C., Banks G., Et al., Behavior-based spyware detection, Proceedings of the 15th USENIX Security Symposium, pp. 273-288, (2006)
- [9] Christodorescu M., Jha S., Seshia S.A., Et al., Semantics-aware malware detection , pp. 32-46, (2005)
- [10] Kinder J., Katzenbeisser S., Schallhart C., Et al., Detecting malicious code by model checking , Detection of Intrusions and Malware, and Vulnerability Assessment, 3548, pp. 174-187, (2005)