Code obfuscation and malware detection by abstract interpretation

M Dalla Preda - 2007 - iris.univr.it
An obfuscating transformation aims at confusing a program in order to make it more difficult
to understand while preserving its functionality. Software protection and malware detection …

Improving siamese neural networks with border extraction sampling for the use in real-time network intrusion detection

M Pawlicki, R Kozik, M Choraś - 2023 International Joint …, 2023 - ieeexplore.ieee.org
Society reaps the benefits of networking technologies, with the number of connected citizens
and devices constantly on the rise. The convenience and efficiency brought by connected …

Taxonomy of malware detection techniques: A systematic literature review

HM Deylami, RC Muniyandi, IT Ardekani… - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
Malware is an international software disease. Research shows that the effect of malware is
becoming chronic. To protect against malware detectors are fundamental to the industry …

A generalized associative Petri net for reasoning

DH Shih, HS Chiang, B Lin - IEEE Transactions on Knowledge …, 2007 - ieeexplore.ieee.org
Although Bayesian networks (BNs) are increasingly being used to solve real-world risk
problems, their use is still constrained by the difficulty of constructing the node probability …

Adversarial evasion-resilient hardware malware detectors

KN Khasawneh, NB Abu-Ghazaleh… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Machine learning offers tantalizing possibilities in computing and autonomous systems: data
driven components and systems are trained to learn their environment and offer decisions …

A comparison between API call sequences and opcode sequences as reflectors of malware behavior

S Alqurashi, O Batarfi - 2017 12th International Conference for …, 2017 - ieeexplore.ieee.org
The volume of malware detected annually is increasing exponentially, and malware
programs are written in such a way that they can often escape detection tools. Some are can …

[引用][C] 基于行为分析和特征码的恶意代码检测技术

李华, 刘智, 覃征, 张小松 - 计算机应用研究, 2011

[引用][C] 恶意软件分类方法研究

卢浩, 胡华平, 刘波 - 计算机应用研究, 2006

Prudent design principles for information flow control

I Bastys, F Piessens, A Sabelfeld - Proceedings of the 13th Workshop on …, 2018 - dl.acm.org
Recent years have seen a proliferation of research on information flow control. While the
progress has been tremendous, it has also given birth to a bewildering breed of concepts …

All‐uses testing of shared memory parallel programs

CSD Yang, LL Pollock - Software Testing, Verification and …, 2003 - Wiley Online Library
Parallelism has become a way of life for many scientific programmers. A significant
challenge in bringing the power of parallel machines to these programmers is providing …