Login / Signup

Identifying Dormant Functionality in Malware Programs.

Paolo Milani ComparettiGuido SalvaneschiEngin KirdaClemens KolbitschChristopher KruegelStefano Zanero
Published in: IEEE Symposium on Security and Privacy (2010)
Keyphrases
  • control flow
  • website
  • search algorithm
  • computer programs
  • fixpoint
  • automatic programming
  • similarity measure
  • expert systems
  • relational databases
  • data flow