Capturing Malware Propagations with Code Injections and Code-Reuse Attacks.
David KorczynskiHeng YinPublished in: CCS (2017)
Keyphrases
- malicious code
- code reuse
- source code
- static analysis
- detect malicious
- software engineering
- reverse engineering
- software evolution
- java card
- network traffic
- dynamic analysis
- open source
- software systems
- design patterns
- detecting malicious
- attack scenarios
- software maintenance
- machine learning
- software projects
- software development
- code clones
- database
- artificial intelligence
- traffic analysis
- security threats
- control flow
- security mechanisms
- case study