是限制 发表于 2025-3-23 11:40:58

http://reply.papertrans.cn/27/2693/269228/269228_11.png

狂热文化 发表于 2025-3-23 17:05:04

https://doi.org/10.1007/978-3-031-57193-0res against downloaders, we present two generic techniques enabling defenders to actively acquire malware samples. To do so, we leverage the publicly accessible downloader infrastructures by replaying download dialogs or observing a downloader’s process activities from within the Windows kernel. Wit

欲望小妹 发表于 2025-3-23 19:48:04

Annalisa Sentuti,Francesca Maria Cesaroniiracy, or are instances of known malware. We evaluate our system using more than 58,000 Android applications and demonstrate that our system scales well and is effective. Our results show that Juxtapp is able to detect: 1) . applications with confirmed buggy code reuse that can lead to serious vulne

Endoscope 发表于 2025-3-23 22:16:15

Annalisa Sentuti,Francesca Maria CesaroniWe demonstrate the efficacy of ADAM using 222 Android malware samples that we collected in the wild. Using ADAM, we generate different variants based on our collected malware samples, and evaluate the detection of these variants against commercial anti-virus systems.

arrhythmic 发表于 2025-3-24 02:29:34

http://reply.papertrans.cn/27/2693/269228/269228_15.png

可行 发表于 2025-3-24 06:48:49

http://reply.papertrans.cn/27/2693/269228/269228_16.png

IDEAS 发表于 2025-3-24 12:30:13

http://reply.papertrans.cn/27/2693/269228/269228_17.png

hedonic 发表于 2025-3-24 18:23:43

http://reply.papertrans.cn/27/2693/269228/269228_18.png

RADE 发表于 2025-3-24 22:17:26

http://reply.papertrans.cn/27/2693/269228/269228_19.png

Enthralling 发表于 2025-3-25 00:40:24

https://doi.org/10.1007/978-3-531-94151-6arity both in memory and on disk in a modified version of QEMU. Using taint analysis, . also tracks all bytes written by the malcode, to provide a detailed view on what (bytes in) files derive from malicious data. Next, it uses this information to remove malicious actions at recovery time.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 9th International Co Ulrich Flegel,Evangelos Markatos,William Robertson