Login / Signup

Anticipating Dormant Functionality in Malware: A Semantics Based Approach.

Muzzamil NoorHaider Abbas
Published in: ISBAST (2013)
Keyphrases
  • control flow
  • logic programming
  • semantic information
  • formal semantics
  • reverse engineering
  • knowledge base
  • knowledge representation
  • conceptual model
  • conceptual graphs
  • transformation rules