Memory scan, Malwarebytes Unpacked, Official Security Blog, Malwarebytes, 2014. ,
Blacksheep, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.341-352, 2012. ,
DOI : 10.1145/2382196.2382234
Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005. ,
DOI : 10.1109/SP.2005.20
SEER, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, pp.186-195, 2014. ,
DOI : 10.1145/2664243.2664271
Antivirus pioneer Symantec declares AV " dead " and " doomed to failure, Ars Technica, 2014. ,
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory, 2014. ,
Find evil in live memory, Alexandria, Virginia (www.mandiant.com/resources, p.2013 ,
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey, Information Security Technical Report, vol.14, issue.1, pp.16-29, 2009. ,
DOI : 10.1016/j.istr.2009.03.003
Analyzing DLL injection, presented at the GSM Conference, 2006. ,
Practical Malware Analysis: The Hands- On Guide to Dissecting Malicious Software, 2012. ,
com ? Because sharing is caring (www. virusshare.com) ,