Malicious Code Detection Using Penalized Splines on OPcode Frequency
-
Altmetric Citations
Alazab, Mamoun; Kadiri, Mohammad; Venkatraman, S; Al-Nemrat, A
Description
Recently, malicious software are gaining exponential growth due to the innumerable obfuscations of extended x86 IA-32 (OPcodes) that are being employed to evade from traditional detection methods. In this paper, we design a novel distinguisher to separate
Collections | ANU Research Publications |
---|---|
Date published: | 2013 |
Type: | Conference paper |
URI: | http://hdl.handle.net/1885/81310 |
Source: | Proceedings - 2012 3rd Cybercrime and Trustworthy Computing Workshop, CTC 2012 |
DOI: | 10.1109/CTC.2012.15 |
Download
File | Description | Size | Format | Image |
---|---|---|---|---|
01_Alazab_Malicious_Code_Detection_Using_2013.pdf | 130.87 kB | Adobe PDF | Request a copy | |
02_Alazab_Malicious_Code_Detection_Using_2013.pdf | 411.6 kB | Adobe PDF | Request a copy |
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.
Updated: 17 November 2022/ Responsible Officer: University Librarian/ Page Contact: Library Systems & Web Coordinator