共 50 条
- [1] Code obfuscation techniques for metamorphic viruses [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (03): : 211 - 220
- [2] Obfuscation Code Localization Based on CFG Generation of Malware [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 229 - 247
- [3] AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 242 - 253
- [5] Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 414 - 421
- [6] An overview of obfuscation techniques used by malware in Visual Basic for Application scripts [J]. 2018 20TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2018), 2019, : 280 - 287
- [9] A Survey on Android Malware Detection Techniques [J]. INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
- [10] A Survey on Heuristic Malware Detection Techniques [J]. 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2013, : 113 - 120