D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.
Jithin PavithranMilan PatnaikChester RebeiroPublished in: WOOT @ USENIX Security Symposium (2019)
Keyphrases
- control flow
- reverse engineering
- malware detection
- data flow
- distributed systems
- multiple independent
- static analysis
- neural network
- concurrent execution
- computational grids
- geographically distributed
- data mining
- parallel execution
- dynamic analysis
- computer networks
- data management
- cooperative
- distributed data
- distributed environment
- mobile agents
- malicious code