우회기법을 이용하는 악성코드 행위기반 탐지 방법
Vol. 16, No. 3, pp. 17-28,
6월.
2006
10.13089/JKIISC.2006.16.3.17, Full Text:
Keywords: 악성코드, 행위기반, 우회기법, 유사도 비교
Abstract Statistics
Cite this article
10.13089/JKIISC.2006.16.3.17, Full Text:
Keywords: 악성코드, 행위기반, 우회기법, 유사도 비교
Abstract Statistics
Cite this article
[IEEE Style]
P. Nam-Youl, K. Yong-Min, N. Bong-Nam, "A Behavior based Detection for Malicious Code Using Obfuscation Technique," Journal of The Korea Institute of Information Security and Cryptology, vol. 16, no. 3, pp. 17-28, 2006. DOI: 10.13089/JKIISC.2006.16.3.17.
[ACM Style]
Park Nam-Youl, Kim Yong-Min, and Noh Bong-Nam. 2006. A Behavior based Detection for Malicious Code Using Obfuscation Technique. Journal of The Korea Institute of Information Security and Cryptology, 16, 3, (2006), 17-28. DOI: 10.13089/JKIISC.2006.16.3.17.