Compilers: principles, techniques, and tools
Compilers: principles, techniques, and tools
A short course on computer viruses (2nd ed.)
A short course on computer viruses (2nd ed.)
Advanced compiler design and implementation
Advanced compiler design and implementation
An Algorithm for Subgraph Isomorphism
Journal of the ACM (JACM)
Compiler techniques for code compaction
ACM Transactions on Programming Languages and Systems (TOPLAS)
Specifying the Semantics of Machine Instructions
IWPC '98 Proceedings of the 6th International Workshop on Program Comprehension
Recovery of Jump Table Case Statements from Binary Code
IWPC '99 Proceedings of the 7th International Workshop on Program Comprehension
ISSTA '04 Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis
A (Sub)Graph Isomorphism Algorithm for Matching Large Graphs
IEEE Transactions on Pattern Analysis and Machine Intelligence
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
Semantics-Aware Malware Detection
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Normalizing Metamorphic Malware Using Term Rewriting
SCAM '06 Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation
Static analysis of executables to detect malicious patterns
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Detecting self-mutating malware using control-flow graph matching
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Polymorphic worm detection using structural information of executables
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Exploiting an antivirus interface
Computer Standards & Interfaces
Detecting metamorphic malwares using code graphs
Proceedings of the 2010 ACM Symposium on Applied Computing
Malware classification based on call graph clustering
Journal in Computer Virology
Binary-code obfuscations in prevalent packer tools
ACM Computing Surveys (CSUR)
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits
International Journal of Wireless Networks and Broadband Technologies
Hi-index | 0.00 |
Next-generation malware will adopt self-mutation to circumvent current malware detection techniques. The authors propose a strategybased on code normalization that reduces different instances of the same malware into a common form that can enable accurate detection.