Login / Signup
Frankenstein: Stitching Malware from Benign Binaries.
Vishwath Mohan
Kevin W. Hamlen
Published in:
WOOT (2012)
Keyphrases
</>
malware detection
control flow
source code
reverse engineering
api calls
image stitching
detecting malicious
anomaly detection
application programming interface
data flow
breast cancer
anti virus
learning algorithm
open source software
high level
software testing
dynamic analysis
object oriented
search engine