Login / Signup
Self-Signed Executables: Restricting Replacement of Program Binaries by Malware.
Glenn Wurster
Paul C. van Oorschot
Published in:
HotSec (2007)
Keyphrases
</>
control flow
static analysis
source code
malware detection
dynamic analysis
reverse engineering
data flow
malicious executables
malicious code
open source
open source software
real time
workflow management systems
api calls
software systems
learning environment
multiscale