共 58 条
[1]
Afianian A(2019)Malware dynamic analysis evasion techniques: A survey ACM Comput Surv (CSUR) 52 1-28
[2]
Basya D(2013)Structural entropy and metamorphic malware J Comput Virol Hacking Tech 9 179-192
[3]
Low R(2006)Dynamic analysis of malicious code J Comput Virol 2 67-77
[4]
Stamp M(2017)Memory forensics: The path forward Digit Investig 20 23-33
[5]
Bayer U(2018)Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory Expert Syst Appl 102 158-178
[6]
Case A(2020)On the Dissection of Evasive Malware IEEE Trans Inf Forensic Secur 15 2750-2765
[7]
Richard III GG(2012)Introlib: Efficient and transparent library call introspection for malware forensics Digit Investig 9 S13-S23
[8]
Cohen A(2008)A survey on automated dynamic malware-analysis techniques and tools ACM Comput Surv (CSUR) 44 1-42
[9]
Nissim N(2006)Attacks on virtual machine emulators Symantec Adv Threat Res 5 1-3
[10]
D’Elia DC(2014)Malware analysis and classification: A survey J Inf Secur 5 56-67