共 30 条
[1]
[Anonymous], 2016, J COMPUT VIROL HACKI
[2]
Aycock J., 2006, Computer Viruses and Malware, V22
[3]
Aycock J, 2011, ADV INFORM SECUR, V50, P1, DOI 10.1007/978-0-387-77741-2
[4]
Different Obfuscation Techniques for Code Protection
[J].
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS,
2015, 70
:757-763
[5]
Bitdefender, 2010, HIST MALW
[6]
Christodorescu M, 2007, ADV INFORM SECUR, P193
[8]
Eilam E., 2005, Reversing: Secrets of Reverse Engineering
[9]
Elias J. K. Bachaalany, ANTIVIRUS HACKERS HD
[10]
Elisan C.C., 2012, Malware, Rootkits Botnets A Beginner's Guide