Mining specifications of malicious behavior
- 7 September 2007
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Mining Minimal Contrast Subgraph PatternsPublished by Society for Industrial & Applied Mathematics (SIAM) ,2006
- PR-MinerPublished by Association for Computing Machinery (ACM) ,2005
- Matching execution histories of program versionsPublished by Association for Computing Machinery (ACM) ,2005
- Semantics-aware malware detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Detecting Malicious Code by Model CheckingLecture Notes in Computer Science, 2005
- Mining Temporal Specifications for Error DetectionLecture Notes in Computer Science, 2005
- Testing malware detectorsPublished by Association for Computing Machinery (ACM) ,2004
- On the Detection of Anomalous System Call ArgumentsLecture Notes in Computer Science, 2003
- CCFinder: a multilinguistic token-based code clone detection system for large scale source codeIEEE Transactions on Software Engineering, 2002
- Computer virus-antivirus coevolutionCommunications of the ACM, 1997