Login / Signup
Malware phylogeny generation using permutations of code.
Md. Enamul Karim
Andrew Walenstein
Arun Lakhotia
Laxmi Parida
Published in:
J. Comput. Virol. (2005)
Keyphrases
</>
malicious code
static analysis
source code
control flow
sequence data
probability distribution
reverse engineering
dynamic analysis
data sets
malware detection
error correcting
program code
open source
network traffic
java programs