作者: Ethan Zane Evans , David Allen Markley , Eric Jason Brandwine
DOI:
关键词:
摘要: In various embodiments, static, dynamic, and behavioral analyses may be performed on an application. A set of code fragments employed by the application determined. device resources An fingerprint is generated for potentially malicious component and/or behaviors are identified. The encodes identifiers resources.