Honeypot-Powered Malware Reverse Engineering.
Michele BombardieriSalvatore CastanòFabrizio CurcioAngelo FurfaroHelen D. KaratzaPublished in: IC2E Workshops (2016)
Keyphrases
- reverse engineering
- malicious code
- dynamic analysis
- software engineering
- object oriented
- forensic analysis
- program understanding
- gene regulatory networks
- computer aided design
- software maintenance
- software product
- reverse engineer
- conceptual schema
- software evolution
- business rules
- artificial intelligence
- genetic regulatory networks
- data sets
- machine learning