共 50 条
- [3] Use of cryptography in malware obfuscation [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
- [4] Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 379 - 385
- [5] Proposed Classification of Malware, Based on Obfuscation [J]. 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 37 - 44
- [6] Detection of obfuscation in java']java malware [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
- [7] Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 125 - 136
- [8] Malware Obfuscation Measuring via Evolutionary Similarity [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
- [9] Malware Obfuscation Detection via Maximal Patterns [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 324 - 328
- [10] A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing [J]. JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (07): : 1651 - 1661