Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
Matt FredriksonSomesh JhaMihai ChristodorescuReiner SailerXifeng YanPublished in: IEEE Symposium on Security and Privacy (2010)
Keyphrases
- detect malicious
- control flow
- detecting malicious
- anomaly detection
- malware detection
- finite state machines
- formal specification
- delay insensitive
- malicious behavior
- high level
- state transitions
- behavior recognition
- reverse engineering
- provably near optimal
- data flow
- specification language
- written in natural language
- functional requirements
- database
- process model
- petri net
- open source
- natural language
- case study
- website
- artificial intelligence
- information retrieval
- neural network
- real time