Measuring similarity of malware behavior, 2009 IEEE 34th Conference on Local Computer Networks, pp.891-898, 2009. ,
DOI : 10.1109/LCN.2009.5355037
Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001. ,
Architecture of a morphological malware detector, Journal in Computer Virology, vol.0, issue.4, 2008. ,
DOI : 10.1007/s11416-008-0102-4
URL : https://hal.archives-ouvertes.fr/inria-00330022
String-rewriting systems, 1993. ,
Automatically Identifying Trigger-based Behavior in Malware, Botnet Detection, vol.36, pp.65-88, 2008. ,
DOI : 10.1007/978-0-387-68768-1_4
Detecting Self-mutating Malware Using Control-Flow Graph Matching, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.129-143, 2006. ,
DOI : 10.1007/11790754_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758
Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005. ,
DOI : 10.1109/SP.2005.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399
Computer viruses, Computers & Security, vol.6, issue.1, pp.22-35, 1987. ,
DOI : 10.1016/0167-4048(87)90122-2
Graph-based comparison of executable objects, Symposium sur la Sécurité des Technologies de l'Information et des Télécommunications, 2005. ,
A uniform framework for problems on context-free grammars, Bulletin of the EATCS, vol.72, pp.169-177, 2000. ,
Automated whitebox fuzz testing, Network Distributed Security Symposium. Internet Society, 2008. ,
Semantics of Programming Languages: Structures and Techniques, 1992. ,
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language, International Symposium on Recent Advances in Intrusion Detection, pp.81-100, 2009. ,
DOI : 10.1007/978-3-642-04342-0_5
Detecting Malicious Code by Model Checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp.174-187, 2005. ,
DOI : 10.1007/11506881_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7354
Dynamic detection and classification of computer viruses using general behaviour patterns, International Virus Bulletin Conference, pp.1-22, 1995. ,
A Layered Architecture for Detecting Malicious Behaviors, International symposium on Recent Advances in Intrusion Detection, pp.78-97, 2008. ,
DOI : 10.1007/978-3-540-87403-4_5
Exploring Multiple Execution Paths for Malware Analysis, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.231-245, 2007. ,
DOI : 10.1109/SP.2007.17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.2410
A fast automaton-based method for detecting anomalous program behaviors, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.144-155, 2001. ,
DOI : 10.1109/SECPRI.2001.924295
Static verification of worm and virus behavior in binary executables using model checking, Information Assurance Workshop, pp.298-300, 2003. ,
On the complexity of a problem on monadic string rewriting systems, Journal of Automata, Languages and Combinatorics, vol.7, issue.4, pp.599-609, 2002. ,