Xiaofeng W.: effective and efficient malware detection at the end host, 2009. ,
Malware Obfuscation Techniques: A Brief Survey, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010. ,
DOI : 10.1109/BWCCA.2010.85
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.9461
Xifeng Yan: Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors, Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010. ,
System Call API Obfuscation (Extended Abstract), 2008. ,
DOI : 10.1007/978-3-540-87403-4_36
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.4668
Mining specifications of malicious behavior, Proc. of the 6th joint meeting of the European software engineering conf. and the ACM SIGSOFT symp. on The foundations of software engineering, 2007. ,
Rootkits: Subverting the Windows kernel, 2005. ,
Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience, IEEE Symposium on Security and Privacy, 2006. ,
Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection, 15th USENIX Security Symposium, 2005. ,
A View on Current Malware Behaviors, 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'09, 2009. ,
AccessMiner, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010. ,
DOI : 10.1145/1866307.1866353