Login / Signup
Synthesizing near-optimal malware specifications from suspicious behaviors.
Somesh Jha
Matthew Fredrikson
Mihai Christodorescu
Reiner Sailer
Xifeng Yan
Published in:
MALWARE (2013)
Keyphrases
</>
detect malicious
control flow
detecting malicious
finite state machines
data flow
anomaly detection
behavior analysis
malware detection
network traffic
reverse engineering
formal specification
malicious behavior
human behavior
delay insensitive
high level
malicious code
behavior patterns
specification language
behavior recognition
dynamic behavior
reactive systems
real time
process model
object oriented
neural network