Login / Signup

Shadow attacks: automatically evading system-call-behavior based malware detection.

Weiqin MaPu DuanSanmin LiuGuofei GuJyh-Charn Liu
Published in: J. Comput. Virol. (2012)
Keyphrases
  • malware detection
  • malicious executables
  • anti virus
  • application programming interface
  • anomaly detection
  • countermeasures
  • database systems
  • distributed systems