作者: David Brumley , Cody Hartwig , Zhenkai Liang , James Newsome , Dawn Song
DOI: 10.1007/978-0-387-68768-1_4
关键词:
摘要: Malware often contains hidden behavior which is only activated when properly triggered. Well known examples include: the MyDoom worm DDoS’s on particular dates, keyloggers log keystrokes for sites, and DDoS zombies are given proper command. We call such trigger-based