期刊文献+

恶意代码的分析技术

下载PDF
导出
摘要 本文讨论了基于代码特征的分析方法、基于代码语义的分析方法。
作者 袁慎芳
出处 《科技创新导报》 2012年第3期36-36,共1页 Science and Technology Innovation Herald
  • 相关文献

参考文献5

二级参考文献25

  • 1Kumar S, Spafford E H. A Pattern Matching Model for Misuse Intrusion Detection. Proceedings of the 17th National Computer Security Conference, 1994. 被引量:1
  • 2Ghosh A K, Schwartzbart A, Schatz M. Learning Program Behavior Profiles for Intrusion Detection. Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, 1999. 被引量:1
  • 3Soman S, Krintz C, Vigna G Detecting Malicious Java Code Using Virtual Machine Auditing. 12th USENIX Security Symposium, 2003.. 被引量:1
  • 4Necula G Proof-carrying Code. In Twenty Fourth ACM, Paris, 1997:106-119. 被引量:1
  • 5Wright C, Cowan C. Linux Security Modules: General Security Support for the Linux Kernel. 2002 USENIX Security Symposium,2002. 被引量:1
  • 6Andrew P Moore, Robert J Ellison, Richard C Linger. Attack Modeling for Information Security and Survivability[R]. CMU/SEI-2001-TN-001, Software Engineering Institute, 2001. 被引量:1
  • 7Jan Steffan,Markus Schumacher.Collaborative Attack Modeling[C]. New York, USA: ACM Press, Proceedings of the 2002 ACM Symposium on Applied Computing (SAC) ,Madrid,Spain,2002. 253-259. 被引量:1
  • 8Oleg Sheyner, Somesh Jha, Joshua Haines, et al. Tools for Generating and Analyzing Attack Graphs [C]. Oakland, CA:Proceedings of the IEEE Symposium on Security and Privacy, 2002. 被引量:1
  • 9T Tidwell,et al. Modeling Internet Attacks [C]. West Point, NY : Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy , 2001.5-6. 被引量:1
  • 10Hu Chang-Zhen. Research on network intrusion detection false fault. In: Proceedings of the 3th Research and Discussion of China Information Security Development and Stratagem, Beijing, 2003(in Chinese)(胡昌振.网络入侵检测误警问题研究.见:第3届中国信息安全发展趋势与战略高层研讨会文集,北京,2003) 被引量:1

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部