Obfuscation: The Hidden Malware.
Philip O'KaneSakir SezerKieran McLaughlinPublished in: IEEE Secur. Priv. (2011)
Keyphrases
- malware detection
- reverse engineering
- control flow
- static analysis
- reverse engineer
- dynamic analysis
- data flow
- malicious code
- anti virus
- software engineering
- source code
- anomaly detection
- artificial intelligence
- real time
- process model
- test cases
- database systems
- hidden information
- social networks
- real world
- neural network
- database