Detection of polymorphic viruses in windows executables
From MaRDI portal
Publication:3058905
Recommendations
- Using algebraic models of programs for detecting metamorphic malwares
- On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems
- Boosting scalability in anomaly-based packed executable filtering
- Modelling metamorphism by abstract interpretation
- Automatic malware analysis. An emulator based approach.
Cited in
(4)- Detecting hidden process with local virtualization technology
- Using algebraic models of programs for detecting metamorphic malwares
- Boosting scalability in anomaly-based packed executable filtering
- On the infeasibility of modeling polymorphic shellcode. Re-thinking the role of learning in intrusion detection systems
This page was built for publication: Detection of polymorphic viruses in windows executables
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058905)