[PDF][PDF] A survey of malware detection techniques

N Idika, AP Mathur - Purdue University, 2007 - profsandhu.com
Malware is a worldwide epidemic. Studies suggest that the impact of malware is getting
worse. Malware detectors are the primary tools in defense against malware. The quality of …

Metaaware: Identifying metamorphic malware

Q Zhang, DS Reeves - Twenty-Third Annual Computer Security …, 2007 - ieeexplore.ieee.org
Detection of malicious software (malware) by the use of static signatures is often criticized for
being overly simplistic. Available methods of obfuscating code (so-called metamorphic …

[图书][B] Malware detection

M Christodorescu, S Jha, D Maughan, D Song, C Wang - 2007 - books.google.com
Shared resources, such as the Internet, have created a highly interconnected cyber-
infrastructure. Critical infrastructures in domains such as medical, power …

Software transformations to improve malware detection

M Christodorescu, S Jha, J Kinder… - Journal in Computer …, 2007 - Springer
Malware is code designed for a malicious purpose, such as obtaining root privilege on a
host. A malware detector identifies malware and thus prevents it from adversely affecting a …

Code obfuscation and malware detection by abstract interpretation

M Dalla Preda - 2007 - iris.univr.it
An obfuscating transformation aims at confusing a program in order to make it more difficult
to understand while preserving its functionality. Software protection and malware detection …

A generalized associative Petri net for reasoning

DH Shih, HS Chiang, B Lin - IEEE Transactions on Knowledge …, 2007 - ieeexplore.ieee.org
Although Bayesian networks (BNs) are increasingly being used to solve real-world risk
problems, their use is still constrained by the difficulty of constructing the node probability …

[图书][B] Behavior-based malware detection

M Christodorescu - 2007 - dl.acm.org
Malicious programs pose a significant problem in today's interconnected world. When
malicious programs (malware) were few and far between, in the 1980s and 1990s, detection …

Formalising Java RMI with explicit code mobility

A Ahern, N Yoshida - Theoretical Computer Science, 2007 - Elsevier
This paper presents an object-oriented, Java-like core language with primitives for
distributed programming and explicit code mobility. We apply our formulation to prove the …

Using algebraic models of programs for detecting metamorphic malwares

NN Kuzjurin, RI Podlovchenko… - Труды Института …, 2007 - cyberleninka.ru
Polymorphic and metamorphic viruses are the most sophisticated malicious programs that
give a lot of trouble to virus scanners. Each time when these viruses infect new executables …

Онлайновый алгоритм упаковки прямоугольников в несколько полос с гарантированными оценками точности

СН Жук - Труды Института системного программирования …, 2007 - cyberleninka.ru
Онлайновый алгоритм упаковки прямоугольников в несколько полос с
гарантированными оценками точности – тема научной статьи по математике читайте …