Obfuscated Malicious Executable Scanner.
Jianyun XuAndrew H. SungSrinivas MukkamalaQingzhong LiuPublished in: J. Res. Pract. Inf. Technol. (2007)
Keyphrases
- malicious code
- reverse engineering
- static analysis
- formal specification
- malicious behavior
- structured light
- malicious attacks
- network traffic
- hand held
- detect malicious
- data sets
- low cost
- laser scanner
- pre determined
- multiscale
- laser beam
- search engine
- attribute grammars
- malicious users
- artificial intelligence
- detecting malicious
- databases