Malicious Code Detection Using Penalized Splines on OPcode Frequency
Recently, malicious software are gaining exponential growth due to the innumerable obfuscations of extended x86 IA-32 (OPcodes) that are being employed to evade from traditional detection methods. In this paper, we design a novel distinguisher to separate
|Collections||ANU Research Publications|
|Source:||Proceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012|
|01_Alazab_Malicious_Code_Detection_Using_2013.pdf||130.87 kB||Adobe PDF||Request a copy|
|02_Alazab_Malicious_Code_Detection_Using_2013.pdf||411.6 kB||Adobe PDF||Request a copy|
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.