A Method for Detecting Obfuscated Calls in Malicious Binaries.
Arun LakhotiaEric Uday KumarMichael VenablePublished in: IEEE Trans. Software Eng. (2005)
Keyphrases
- preprocessing
- optimization method
- detection method
- fully automatic
- experimental evaluation
- synthetic data
- high precision
- neural network
- clustering method
- detection algorithm
- model selection
- reverse engineering
- segmentation method
- theoretical analysis
- high accuracy
- computational cost
- cost function
- prior knowledge
- k means
- objective function
- machine learning