Title: | exploring malware behaviors based on environment constitution |
Author: | Su Purui
; Ying Lingyun
; Feng Dengguo
|
Source: | Proceedings - 2008 International Conference on Computational Intelligence and Security, CIS 2008
|
Conference Name: | International Conference on Computational-Intelligence and Security
|
Conference Date: | DEC 13-17,
|
Issued Date: | 2008
|
Conference Place: | Suzhou, PEOPLES R CHINA
|
Keyword: | Malware Analysis
; Computing Environment Constitution
|
Publisher: | 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS
|
Publish Place: | 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
|
ISBN: | 978-1-4244-4196-9
|
Department: | Su, Purui; Ying, Lingyun; Feng, Dengguo Chinese Acad Sci, Inst Software, State Key Lab Secur, Beijing, Peoples R China.
|
Sponsorship: | SE Univ, Soochow Univ, IEEE Nanjing Sect, IEEE (Hong Kong) Computat Intelligence Chapter, Guangdong Univ, Xidian Univ, IEEE Comp Soc Press
|
English Abstract: | Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malwa |
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/10700
|
Appears in Collections: | 信息安全国家重点实验室_会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
04724666.pdf(365KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Su Purui,Ying Lingyun,Feng Dengguo. exploring malware behaviors based on environment constitution[C]. 见:International Conference on Computational-Intelligence and Security. Suzhou, PEOPLES R CHINA. DEC 13-17,.
|
|
|