咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...

主题

  • 5 篇 obfuscated code
  • 2 篇 deep learning
  • 2 篇 malware
  • 1 篇 computer science
  • 1 篇 iot applications
  • 1 篇 dynamic features
  • 1 篇 static analysis
  • 1 篇 hybrid
  • 1 篇 cybersecurity
  • 1 篇 taint analysis
  • 1 篇 malicious code
  • 1 篇 symbolic executi...
  • 1 篇 machine learning
  • 1 篇 binary analysis
  • 1 篇 de-obfuscation
  • 1 篇 static features
  • 1 篇 advanced ensembl...
  • 1 篇 sequence compres...
  • 1 篇 feature engineer...
  • 1 篇 malware detectio...

机构

  • 1 篇 king fahd univ p...
  • 1 篇 univ wisconsin d...
  • 1 篇 king fahd univ p...
  • 1 篇 cent south univ ...
  • 1 篇 univ sannio dept...
  • 1 篇 comsats univ isl...
  • 1 篇 the university o...

作者

  • 1 篇 ahmed adel f.
  • 1 篇 yadegari babak
  • 1 篇 hammoudeh mohamm...
  • 1 篇 visaggio corrado...
  • 1 篇 pagin giuseppe a...
  • 1 篇 zhang shigeng
  • 1 篇 miller barton p.
  • 1 篇 qin yan
  • 1 篇 wang weiping
  • 1 篇 vasan danish
  • 1 篇 chen zixian
  • 1 篇 roundy kevin a.
  • 1 篇 canfora gerardo
  • 1 篇 akram junaid

语言

  • 4 篇 英文
  • 1 篇 其他
检索条件"主题词=Obfuscated code"
5 条 记 录,以下是1-10 订阅
排序:
Automatic deobfuscation and reverse engineering of obfuscated code
Automatic deobfuscation and reverse engineering of obfuscate...
收藏 引用
作者: Yadegari, Babak The University of Arizona
学位级别:Ph.D.
Automatic malware analysis is an essential part of today's computer security practices. Nearly one million malware samples were delivered to the analysts on a daily basis on year 2014 alone while the number of sam... 详细信息
来源: 评论
ZipAST: Enhancing malicious JavaScript detection with sequence compression
收藏 引用
COMPUTERS & SECURITY 2025年 153卷
作者: Chen, Zixian Wang, Weiping Qin, Yan Zhang, Shigeng Cent South Univ Sch Comp Sci & Engn Changsha Peoples R China
JavaScript is a key component of websites and greatly enhances web page functionality. At the same time, it has become one of the most common attack vectors in malicious web pages. Early approaches to detecting malici... 详细信息
来源: 评论
An Advanced Ensemble Framework for defending against obfuscated Windows, Android, and IoT malware
收藏 引用
APPLIED SOFT COMPUTING 2025年 173卷
作者: Vasan, Danish Akram, Junaid Hammoudeh, Mohammad Ahmed, Adel F. King Fahd Univ Petr & Minerals Interdisciplinary Res Ctr Intelligent Secure Syst Dhahran Saudi Arabia COMSATS Univ Islamabad Dept Comp Sci Lahore Campus Islamabad Pakistan King Fahd Univ Petr & Minerals Informat & Comp Sci Dept Acad Belt Rd Dhahran Saudi Arabia
The detection and analysis of malware binaries pose significant challenges due to their obfuscated and packed nature, rendering traditional static analysis techniques ineffective. Extracting static features in a dynam... 详细信息
来源: 评论
An Empirical Study of Metric-Based Methods to Detect obfuscated code
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2013年 第2期7卷 59-73页
作者: Visaggio, Corrado Aaron Pagin, Giuseppe Antonio Canfora, Gerardo Univ Sannio Dept Engn I-82100 Benevento Italy
Protecting data and applications from malware and other forms of malicious code has assumed a great relevance in the current era of pervasive web-based applications. Attackers often use code obfuscation to hide harmfu... 详细信息
来源: 评论
Hybrid Analysis and Control of Malware
Hybrid Analysis and Control of Malware
收藏 引用
13th International Symposium on Recent Advances in Intrusion Detection Systems
作者: Roundy, Kevin A. Miller, Barton P. Univ Wisconsin Dept Comp Sci Madison WI 53706 USA
Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ. The most prevalent of these techniques are cod... 详细信息
来源: 评论