Login / Signup

Detection of injected, dynamically generated, and obfuscated malicious code.

Jesse C. RabekRoger I. KhazanScott M. LewandowskiRobert K. Cunningham
Published in: WORM (2003)
Keyphrases
  • malicious code
  • dynamically generated
  • static analysis
  • reverse engineering
  • network traffic
  • website
  • web pages
  • anomaly detection
  • data sets
  • high level
  • source code
  • conceptual model