Login / Signup
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Qi Wang
Wajih Ul Hassan
Ding Li
Kangkook Jee
Xiao Yu
Kexuan Zou
Junghwan Rhee
Zhengzhang Chen
Wei Cheng
Carl A. Gunter
Haifeng Chen
Published in:
NDSS (2020)
Keyphrases
</>
data analysis
multimedia
case study
knowledge intensive
static analysis