作者: Yuping Li , Jiyong Jang , Xinming Ou
DOI: 10.1007/978-3-030-37228-6_14
关键词: Control flow graph 、 Hash function 、 Theoretical computer science 、 Security analysis 、 Malware analysis 、 Computer science 、 Graph (abstract data type) 、 Fuzzy logic 、 Cluster analysis 、 Malware
摘要: … representative graph features, which could result in a universal and compact graph format … concept is applicable to represent CFGs to assess graph similarity, we design a blended n-…