행위 그래프 기반의 변종 악성코드 탐지
Vol. 21, No. 2, pp. 37-48,
4월.
2011
10.13089/JKIISC.2011.21.2.37, Full Text:
Keywords: information security, Metamorphic Malware, Behavior Graph
Abstract Statistics
Cite this article
10.13089/JKIISC.2011.21.2.37, Full Text:
Keywords: information security, Metamorphic Malware, Behavior Graph
Abstract Statistics
Cite this article
[IEEE Style]
J. Kwon, J. Lee, H. Jeong, H. Lee, "Metamorphic Malware Detection using Subgraph Matching," Journal of The Korea Institute of Information Security and Cryptology, vol. 21, no. 2, pp. 37-48, 2011. DOI: 10.13089/JKIISC.2011.21.2.37.
[ACM Style]
Jong-Hoon Kwon, Je-Hyun Lee, Hyun-Cheol Jeong, and Hee-Jo Lee. 2011. Metamorphic Malware Detection using Subgraph Matching. Journal of The Korea Institute of Information Security and Cryptology, 21, 2, (2011), 37-48. DOI: 10.13089/JKIISC.2011.21.2.37.