共 27 条
[1]
Deepen D., MALICIOUS DOCUMENTS
[2]
Dinaburg A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P51
[3]
Dolan-Gavitt B., 2015, P 5 PROGR PROT REV E, P1, DOI DOI 10.1145/2843859.2843867
[5]
Gilboy M. R, 2016, THESIS
[6]
Guarnieri C., CUCKOO SANDBOX 1 2
[7]
Guarnieri C., CUCKOO SANDBOX 2 0 R
[8]
Guarnieri C., 2013, THE CUCKOO SANDBOX
[9]
Kasama T., 2014, THESIS
[10]
Keragala D., 2016, Detecting malware and sandbox evasion techniques