参考文献
[1]瑞星安全资讯.Stuxnet病毒全球肆虐将影响我国众多企业[EB/OL].[2016-10-07].http:// www.rising.com.cn/about/news/rising/2010-09-25/8226.html.
[2]COCHIN C,CRUZ B,DENNEDY M,et al.McAfee Labs Threat Report[Z].[S.1.]:McAfee Corporation,2014.
[3]WOOD P,NAHORNEY B,CHANDRASEKAR K,et al.Internet Security Threat Report[Z].[S.1.]:Symantec Corporation,2016.
[4]RIECK K,HOLZ T,WILLEMS C,et al.Learning and Classification of Malware Behavior[C]//Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment.Paris,France:[s.n.],2008:215-223.
[5]TIAN R,BATTEN L,VERSTEEG S,et al.Function Length as a Tool for Malware Classification[C]//Proceedings of the 3rd International Conference on Malicious and Unwanted Software.Los Alamitos,USA:IEEE Press,2008:369-378.
[6]TIAN R,BATTEN L,ISLAM R,et al.An Automated Classification System Based on the Strings of Trojan and Virus Families[C]//Proceedings of the 4rd International Conference on Malicious and Unwanted Software.New York,USA:ACM Press,2009:459-468.
[7]ISLAM R,TIAN R,BATTEN L,et al.Classification of Malware Based on String and Function Feature Selection[C]//Proceedings of the 2nd Cybercrime and Trustworthy Computing Workshop.Ballarat,Australia:IEEE Press,2010:159-167.
[8]PARK Y,REEVES D,MULUKUTLA V,et al.Fast Malware Classification by Automated Behavioral Graph Matching [C]//Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligent Research.Oak Ridge,USA:ACM Press,2010:156-165.
[9]岳峰,庞建民,赵荣彩,等.反汇编过程中call指令后混淆数据的识别[J].计算机工程,2010,36(7):144-146.
[10]王新志,孙乐昌,张旻,等.基于序列模式发现的恶意行为检测方法[J].计算机工程,2011,37(24):1-3.
[11]张一弛,庞建民,范学斌,等.基于模型检测的程序恶意行为识别方法[J].计算机工程,2012,38(18):107-110.
[12]INSEON Y.Visualizing Windows Executable Viruses Using Self-organizing Maps[C]//Proceedings of ACM Workshop on Visualization and Data Mining for Computer Security.New York,USA:ACM Press,2004:154-166.
[13]THOMAS P.Signature Visualization of Software Binaries[C]//Proceedings of the 4th ACM Symposium on Software Visualization.New York,USA:ACM Press,2008:246-257.
[14]DANIEL Q,LORIE L.Visualizing Compiled Executables for Malware Analysis[C]//Proceedings of IEEE Workshop on Visualization for Cyber Security.New Jersey,USA:IEEE Press,2009:258-267.
[15]PHILIPP T,THORSTEN H,JAN G,et al.Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs[C]//Proceedings of 2009 IEEE Workshop on Visualization for Cyber Security.New Jersey,USA:IEEE Press,2009:547-558.
[16]WEI Z,YACIN N.MalwareVis:Entry-based Visualization of Malware Network Traces[C]//Proceedings of VizSec’12.Seattle,USA:ACM Press,2012:354-363.
[17]CONTI G,DEAN E,SINDA M,et al.Visual Reverse Engineering of Binary and Data Files[C]//Proceedings of VizSec’08.Cambridge,USA:IEEE Press,2008:265-278.
[18]NATARJ L,KARTHIKEYAN S,Jacob G,et al.Malware Images:Visualization and Automatic Classification[C]//Proceedings of VizSec’11.Pittsburgh,USA:IEEE Press,2011:152-168.
编辑索书志 |