Computer Science ›› 2008, Vol. 35 ›› Issue (2): 93-95.
Previous Articles Next Articles
LI Yi-Chao, HE Zi-Ang, CAO Yue (School of Computer Science & Engineering, UEST of China, Chengdu 610054)
Online:
Published:
Abstract: This paper presents a method to detect obfuscated system calls of malware. The idea is to use address stack and address stack graph to detect obfuscated system calls of malware. An address stack is used to associate each element in the stack to the instru
Key words: Malware, Obfuscated calls, Address stack, Address stack graph
LI Yi-Chao, HE Zi-Ang, CAO Yue (School of Computer Science & Engineering, UEST of China, Chengdu 610054). [J].Computer Science, 2008, 35(2): 93-95.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I2/93
Cited