,
,
Measuring similarity of malware behavior, IEEE Conference on Local Computer Networks, pp.891-898, 2009. ,
Behavior Abstraction in Malware Analysis-Extended Version. HAL-INRIA Open Archive Number inria-00509486 ,
URL : https://hal.archives-ouvertes.fr/inria-00509486
Static detection of malicious code in executable programs, Symposium on Requirements Engineering for Information Security, 2001. ,
Architecture of a morphological malware detector, Journal in Computer Virology, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00330022
Automatically identifying trigger-based behavior in malware, Botnet Detection, vol.36, pp.65-88, 2008. ,
Detecting self-mutating malware using control-flow graph matching, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, vol.4064, pp.129-143, 2006. ,
Semantics-aware malware detection, IEEE Symposium on Security and Privacy, pp.32-46, 2005. ,
Computer viruses: Theory and experiments, Computers and Security, vol.6, issue.1, pp.22-35, 1987. ,
Graph-based comparison of executable objects, Symposium sur la Sécurité des Technologies de l'Information et des Télécommunications, 2005. ,
A uniform framework for problems on context-free grammars, Bulletin of the EATCS, vol.72, pp.169-177, 2000. ,
Automated whitebox fuzz testing, Network Distributed Security Symposium. Internet Society, 2008. ,
Semantics of Programming Languages: Structures and Techniques, 1992. ,
Malware behavioral detection by attribute-automata using abstraction from platform and language, International Symposium on Recent Advances in Intrusion Detection, vol.5758, pp.81-100, 2009. ,
Detecting malicious code by model checking, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, vol.3548, pp.174-187, 2005. ,
Dynamic detection and classification of computer viruses using general behaviour patterns, International Virus Bulletin Conference, pp.1-22, 1995. ,
A layered architecture for detecting malicious behaviors, International symposium on Recent Advances in Intrusion Detection, vol.5230, pp.78-97, 2008. ,
Exploring multiple execution paths for malware analysis, IEEE Symposium on Security and Privacy, pp.231-245, 2007. ,
A fast automaton-based method for detecting anomalous program behaviors, IEEE Symposium on Security and Privacy, pp.144-155, 2001. ,
Static verification of worm and virus behavior in binary executables using model checking, Information Assurance Workshop, pp.298-300, 2003. ,