[1] |
HARALE S T A . Detection and analysis of network & application layer attacks using honey pot with system security features[J]. International Journal of Advance Research,Ideas and Innovations in Technology, 2017: 1-4.
|
[2] |
MING J , XIN Z , LAN P ,et al. Impeding behavior-based malware analysis via replacement attacks to malware specifications[J]. Journal of Computer Virology and Hacking Techniques, 2016: 1-15.
|
[3] |
BOSSERT G,GUIHéRY F , HIET G . Towards automated protocol reverse engineering using semantic information[J]. 9th ACM Symposium on Information,Computer and Communications Security, 2014.
|
[4] |
胡燕京, 裴庆祺 . 网络协议隐形攻击行为的聚类感知挖掘[J]. 通信学报, 2017,38(6): 39-48.
|
|
HU Y J , PEI Q Q . Clustering perception mining of network protocol’s stealth attack behavior[J]. Journal on Communicaitons, 2017,38(6): 39-48.
|
[5] |
ANDERSON B , STORLIE C , LANE T . Improving malware classification:bridging the static/dynamic gap[C]// The 5th ACM Workshop on Security and Artificial Intelligence. 2012.
|
[6] |
EGELE M , SCHOLTE T , KIRDA E ,et al. A survey on automated dynamic malware-analysis techniques and tools[J]. ACM Computing Surveys, 2012: 1-42.
|
[7] |
CABALLERO J , SONG D . Automatic protocol reverse-engineering:message format extraction and field semantics inference[J]. Computer Networks, 2013: 451-474.
|
[8] |
LCLI X D , . A survey on methods of automatic protocol reverse engineering[C]// The 2011 Seventh International Conference on Computational Intelligence and Security. 2011: 685-689.
|
[9] |
CANFORA G , IANNACCONE A , VISAGGIO C . Static analysis for the detection of metamorphic computer viruses using repeatedinstructions counting heuristics[J]. Journal of Computer Virology and Hacking Techniques, 2014: 11-27.
|
[10] |
KANG B , KIM T , KWON H ,et al. Malware classification method via binary content comparison[C]// The 2012 ACM Research in Applied Computation Symposium. 2012.
|
[11] |
HAN K , LIM J H , IM E G . Malware analysis method using visualization of binary files[C]// The 2013 Research in Adaptive and Convergent Systems. Canada, 2013.
|
[12] |
QIAO Y , HE J , YANG Y ,et al. A lightweight design of malware behavior representation[C]// IEEE International Conference on Trust Security and Privacy in Computing and Communications,IEEE Computer Society. 2013: 1607-1612.
|
[13] |
CABALLERO J , POOSANKAM P , KREIBICH C ,et al. Dispatcher:enabling active botnet infiltration using automatic protocol reverse-engineering[C]// The 16th ACM Conference on Computer and Communications Security. Chicago,Illinois,USA, 2009.
|
[14] |
KANG J , PARK J H . A secure-coding and vulnerability check system based on smart-fuzzing and exploit[J]. Neurocomputing, 2017.
|
[15] |
BUCHLER M , HOSSEN K , MIHANCEA P F ,et al. Model inference and security testing in the spacios project[C]// Software Maintenance,Reengineering and Reverse Engineering. 2014: 411-414.
|
[16] |
CUI B , WANG F , HAO Y ,et al. A taint based approach for automatic reverse engineering of gray-box file formats[J]. Soft Computing, 2015: 1-16.
|
[17] |
POLINO M , SCORTI A , MAGGI F ,et al. Jackdaw:towards automatic reverse engineering of large datasets of binaries[J]. Detection of Intrusions and Malware,and Vulnerability Assessment.Springer International Publishing, 2015: 121-143.
|
[18] |
RAHIMIAN A , ZIARATI R , PREDA S ,et al. On the reverse engineering of the citadel botnet[M]. Foundations and Practice of Security. Springer International Publishing, 2014: 408-425.
|