参考文章(39)
Michalis Polychronakis, Angelos D. Keromytis, Vasilis Pappas, Transparent ROP exploit mitigation using indirect branch tracing usenix security symposium. pp. 447- 462 ,(2013)
Johannes Hoffmann, Stephan Neumann, Thorsten Holz, Mobile Malware Detection Based on Energy Fingerprints -- A Dead End? recent advances in intrusion detection. pp. 348- 368 ,(2013) , 10.1007/978-3-642-41284-4_18
Mitchell N. Quinn, David E. Hooks, Automated malware detection and remediation ,(2011)
Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu, SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 190- 208 ,(2012) , 10.1007/978-3-642-31909-9_11
Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos, Emulation-based detection of non-self-contained polymorphic shellcode recent advances in intrusion detection. pp. 87- 106 ,(2007) , 10.1007/978-3-540-74320-0_5
Ke Wang, Janak J. Parekh, Salvatore J. Stolfo, Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Lecture Notes in Computer Science. pp. 226- 248 ,(2006) , 10.1007/11856214_12
Tal Garfinkel, Mendel Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection. network and distributed system security symposium. ,(2003)