An empirical study of the reliability of UNIX utilities
Communications of the ACM
Large-scale C++ software design
Large-scale C++ software design
Advanced compiler design and implementation
Advanced compiler design and implementation
A Retargetable C Compiler: Design and Implementation
A Retargetable C Compiler: Design and Implementation
Design Patterns: Abstraction and Reuse of Object-Oriented Design
ECOOP '93 Proceedings of the 7th European Conference on Object-Oriented Programming
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
Scale-free geometry in OO programs
Communications of the ACM - Adaptive complex enterprises
Optimizing general purpose compiler optimization
Proceedings of the 2nd conference on Computing frontiers
Application of graph theory to OO software engineering
Proceedings of the 2006 international workshop on Workshop on interdisciplinary software engineering research
The Structure and Dynamics of Networks: (Princeton Studies in Complexity)
The Structure and Dynamics of Networks: (Princeton Studies in Complexity)
An empirical study of the robustness of MacOS applications using random testing
Proceedings of the 1st international workshop on Random testing
More "normal" than normal: scaling distributions and complex systems
WSC '04 Proceedings of the 36th conference on Winter simulation
Static analysis of executables to detect malicious patterns
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Polymorphic worm detection using structural information of executables
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Opcodes as predictor for malware
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
This paper examines the callgraphs of 120 malicious and 280 non-malicious executables. Pareto models are fitted to indegree, outdegree and basic block count distributions, and a statistically significant difference is shown for the derived power law exponent. A two-step optimization process is hypothesized to account for structural features of the executable.