Synthesizing near-optimal malware specifications from suspicious behaviors.
Somesh JhaMatthew FredriksonMihai ChristodorescuReiner SailerXifeng YanPublished in: MALWARE (2013)
Keyphrases
- detect malicious
- control flow
- detecting malicious
- finite state machines
- data flow
- anomaly detection
- behavior analysis
- malware detection
- network traffic
- reverse engineering
- formal specification
- malicious behavior
- human behavior
- delay insensitive
- high level
- malicious code
- behavior patterns
- specification language
- behavior recognition
- dynamic behavior
- reactive systems
- real time
- process model
- object oriented
- neural network