Login / Signup
Shadow attacks: automatically evading system-call-behavior based malware detection.
Weiqin Ma
Pu Duan
Sanmin Liu
Guofei Gu
Jyh-Charn Liu
Published in:
J. Comput. Virol. (2012)
Keyphrases
</>
malware detection
malicious executables
anti virus
application programming interface
anomaly detection
countermeasures
database systems
distributed systems