咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程

主题

  • 2 篇 function embeddi...
  • 1 篇 cryptographic fu...
  • 1 篇 function call gr...
  • 1 篇 neural network
  • 1 篇 binary analysis
  • 1 篇 android malware ...
  • 1 篇 graph convolutio...

机构

  • 1 篇 huazhong univ sc...
  • 1 篇 kexing sci pk 15...
  • 1 篇 huazhong univ sc...
  • 1 篇 sichuan univ col...
  • 1 篇 sichuan univ col...

作者

  • 1 篇 yuan wei
  • 1 篇 zhou anmin
  • 1 篇 li heng
  • 1 篇 liu luping
  • 1 篇 wang yan
  • 1 篇 liu liang
  • 1 篇 gao cuiying
  • 1 篇 jiang yuan
  • 1 篇 jia li
  • 1 篇 jia peng
  • 1 篇 cai minghui

语言

  • 2 篇 英文
检索条件"主题词=function embedding"
2 条 记 录,以下是1-10 订阅
排序:
Learning features from enhanced function call graphs for Android malware detection
收藏 引用
NEUROCOMPUTING 2021年 423卷 301-307页
作者: Cai, Minghui Jiang, Yuan Gao, Cuiying Li, Heng Yuan, Wei Huazhong Univ Sci & Technol Sch Elect Informat & Commun 1037 Luoyu Rd Wuhan Peoples R China Huazhong Univ Sci & Technol 1037 Luoyu Rd Wuhan Peoples R China Kexing Sci Pk 15 Keyuan Rd Shenzhen Peoples R China
Analyzing the runtime behaviors of Android apps is crucial for malware detection. In this paper, we attempt to learn the behavior level features of an app from function calls. The challenges of this task are twofold. ... 详细信息
来源: 评论
A Neural Network-Based Approach for Cryptographic function Detection in Malware
收藏 引用
IEEE ACCESS 2020年 8卷 23506-23521页
作者: Jia, Li Zhou, Anmin Jia, Peng Liu, Luping Wang, Yan Liu, Liang Sichuan Univ Coll Cybersecur Chengdu 610065 Peoples R China Sichuan Univ Coll Elect & Informat Engn Chengdu 610065 Peoples R China
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security re... 详细信息
来源: 评论