Sign in

Analyzing program dependencies for malware detection.

Mila Dalla PredaIsabella MastroeniRoberto Giacobazzi
Published in: PPREW@POPL (2014)
Keyphrases
  • malware detection
  • malicious executables
  • anomaly detection
  • execution traces
  • api calls
  • control flow
  • feature extraction
  • test cases
  • computer networks
  • social networking
  • application programming interface