Computer Science ›› 2008, Vol. 35 ›› Issue (2): 93-95.

Previous Articles     Next Articles

LI Yi-Chao, HE Zi-Ang, CAO Yue (School of Computer Science & Engineering, UEST of China, Chengdu 610054)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: This paper presents a method to detect obfuscated system calls of malware. The idea is to use address stack and address stack graph to detect obfuscated system calls of malware. An address stack is used to associate each element in the stack to the instru

Key words: Malware, Obfuscated calls, Address stack, Address stack graph

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!