Login / Signup
Identifying Dormant Functionality in Malware Programs.
Paolo Milani Comparetti
Guido Salvaneschi
Engin Kirda
Clemens Kolbitsch
Christopher Kruegel
Stefano Zanero
Published in:
IEEE Symposium on Security and Privacy (2010)
Keyphrases
</>
control flow
website
search algorithm
computer programs
fixpoint
automatic programming
similarity measure
expert systems
relational databases
data flow