共 50 条
- [1] Use of cryptography in malware obfuscation [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
- [3] Program obfuscation by strong cryptography [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 242 - 247
- [4] Proposed Classification of Malware, Based on Obfuscation [J]. 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 37 - 44
- [5] Detection of obfuscation in java']java malware [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
- [7] Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 125 - 136
- [8] Malware Obfuscation Measuring via Evolutionary Similarity [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
- [9] Malware Obfuscation Detection via Maximal Patterns [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 324 - 328
- [10] On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 241 - 250