Login / Signup
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code.
Julien Cassagne
Ettore Merlo
Guy-Vincent Jourdan
Iosif-Viorel Onut
Published in:
FPS (1) (2023)
Keyphrases
</>
static analysis
malicious code
reverse engineering
dynamic analysis
source code
object oriented
control flow
anti virus
malware detection
malicious behavior
regular expressions
network traffic
data sets
test suite
data processing
knowledge discovery
training data
signature recognition
high level
machine learning