[1]Wang Xinran, Jhi Yoon-Chan, Zhu Sencun, et al. Detecting Software Theft via System Call Based Birthmarks[C]// Proc. of the 25th Annual Computer Security Applications Conference. Honolulu, USA: [s. n.], 2009: 149-158.[2]Christodorescu M, Jha S, Kruegel C. Mining Specifications of Malicious Behavior[C]//Proc. of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York, USA: ACM Press, 2007: 5-14. [3]Bayer U, Comparetti P M, Hlauscheck C, et al. Scalable, Behavior-based Malware Clustering[C]//Proc. of NDSS’09. San Diego, USA: [s. n.], 2009. [4]Wang Xinran, Jhi Yoon-Chan, Zhu Sencun, et al. Behavior Based Software Theft Detection[C]//Proc. of the 16th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2009.[5]Woods S, Yang Qiang. The Program Understand Problem: Analysis of Heuristic Approach[C]//Proc. of the 18th Int’l Conference on Software Engineering. Berlin, Germany: [s. n.], 1996: 25-29.[6]The Symantec Enterprise. Understanding and Managing Polymorphic Virus[EB/OL]. (2012-03-20). http://www. symantec.com/avcenter/reference/striker.pdf. [7]Kaze A. Stealth API-based Decryptor[EB/OL]. (2012-03- 20). http://vxheavens.com/lib/vkz00.html.[8]杨 轶, 苏璞睿, 应凌云, 等. 基于行为依赖特征的恶意代码相似性比较方法[J]. 软件学报, 2011, 22(10): 2438-2453.[9]Newsome J, Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software[C]//Proc. of the 12th Annual Network and Distributed System Security Symposium. [S. 1.]: IEEE Press, 2005.[10]Cordella L P, Foggia P, Sansone C, et al. A (Sub) Graph Isomorphism Algorithm for Matching Large Graphs[J]. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2004, 26(10): 1367-1372. |