Metamorphic worm that carries its own morphing engine

S Madenur Sridhara, M Stamp - Journal of Computer Virology and …, 2013 - Springer
Metamorphic malware changes its internal structure across generations, but its functionality
remains unchanged. Well-designed metamorphic malware will evade signature detection …

A similarity metric method of obfuscated malware using function-call graph

M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren… - Journal of Computer …, 2013 - Springer
Code obfuscating technique plays a significant role to produce new obfuscated malicious
programs, generally called malware variants, from previously encountered malwares …

Metamorphic detection using function call graph analysis

P Deshpande - 2013 - scholarworks.sjsu.edu
Well-designed metamorphic malware can evade many commonly used malware detection
techniques including signature scanning. In this research, we consider a score based on …

Visualization techniques for malware behavior analysis

ARA Grégio, RDC Santos - Sensors, and Command, Control …, 2011 - spiedigitallibrary.org
Malware spread via Internet is a great security threat, so studying their behavior is important
to identify and classify them. Using SSDT hooking we can obtain malware behavior by …

Ecfgm: enriched control flow graph miner for unknown vicious infected code detection

M Eskandari, S Hashemi - Journal in Computer Virology, 2012 - Springer
Vicious codes, especially viruses, as a kind of impressive malware have caused many
disasters and continue to exploit more vulnerabilities. These codes are injected inside …

A graph theoretic approach to fast and accurate malware detection

Z Shafiq, A Liu - 2017 IFIP Networking Conference (IFIP …, 2017 - ieeexplore.ieee.org
Due to the unavailability of signatures for previously unknown malware, non-signature
malware detection schemes typically rely on analyzing program behavior. Prior behavior …

Using a novel behavioral stimuli-response framework to defend against adversarial cyberspace participants

D Bilar, B Saltaformaggio - 2011 3rd International Conference …, 2011 - ieeexplore.ieee.org
Autonomous Baiting, Control and Deception of Adversarial Cyberspace Participants (ABCD-
ACP) is an experimental defensive framework against potentially adversarial cyberspace …

'Weird machine'patterns

S Bratus, J Bangert, A Gabrovsky, A Shubina… - … Unifying Design Patterns …, 2014 - Springer
You do not understand how your program really works until it has been exploited. We
believe that computer scientists and software engineers should regard the activity of modern …

[引用][C] 网络化软件的复杂网络特性实证

马于涛, 何克清, 李兵, 刘婧 - 软件学报, 2011

Formal models of reproduction: from computer viruses to artificial life

M Webster - 2008 - livrepository.liverpool.ac.uk
In this thesis we describe novel approaches to the formal description of systems which
reproduce, and show that the resulting models have explanatory power and practical …