Transforming malicious code to ROP gadgets for antivirus evasion.
Christoforos NtantogianGeorgios PouliosGeorgios KaropoulosChristos XenakisPublished in: IET Inf. Secur. (2019)
Keyphrases
- malicious code
- computer viruses
- static analysis
- dynamic analysis
- malicious behavior
- anti virus
- reverse engineering
- network traffic
- source code
- malicious executables
- malware detection
- countermeasures
- regular expressions
- artificial intelligence
- real world
- pattern matching
- operating system
- active learning
- data model
- object recognition
- database systems
- case study