Automatically Identifying Trigger-based Behavior in Malware
- 22 October 2007
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Exploring Multiple Execution Paths for Malware AnalysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- EXEPublished by Association for Computing Machinery (ACM) ,2006
- ReplayerPublished by Association for Computing Machinery (ACM) ,2006
- Temporal searchPublished by Association for Computing Machinery (ACM) ,2006
- CUTEPublished by Association for Computing Machinery (ACM) ,2005
- Context- and path-sensitive memory leak detectionACM SIGSOFT Software Engineering Notes, 2005
- DARTPublished by Association for Computing Machinery (ACM) ,2005
- A Tool for Checking ANSI-C ProgramsPublished by Springer Nature ,2004
- Extended static checking for JavaPublished by Association for Computing Machinery (ACM) ,2002
- Avoiding exponential explosionPublished by Association for Computing Machinery (ACM) ,2001