Login / Signup
Detection of injected, dynamically generated, and obfuscated malicious code.
Jesse C. Rabek
Roger I. Khazan
Scott M. Lewandowski
Robert K. Cunningham
Published in:
WORM (2003)
Keyphrases
</>
malicious code
dynamically generated
static analysis
reverse engineering
network traffic
website
web pages
anomaly detection
data sets
high level
source code
conceptual model