• Aucun résultat trouvé

Mining Malware Specifications through Static Reachability Analysis

N/A
N/A
Protected

Academic year: 2021

Partager "Mining Malware Specifications through Static Reachability Analysis"

Copied!
19
0
0

Texte intégral

Loading

Figure

Fig. 3. Learning malicious behaviors
Table 2. Test dataset name family and number of samples (#) detected

Références

Documents relatifs

We reduce the malware detection problem to the model checking problem of PDSs against SPCARET formulas, and we propose efficient algorithms to model check SPCARET formulas for PDSs..

Unité de recherche INRIA Rennes, Irisa, Campus universitaire de Beaulieu, 35042 RENNES Cedex Unité de recherche INRIA Rhône-Alpes, 655, avenue de l’Europe, 38330 MONTBONNOT ST

Unit´e de recherche INRIA Rocquencourt, Domaine de Voluceau, Rocquencourt, BP 105, 78153 LE CHESNAY Cedex Unit´e de recherche INRIA Sophia-Antipolis, 2004 route des Lucioles, BP

7 May 1997 China acceded to the Unidroit Convention of 24 June 1995 on Stolen or Illegally Exported Cultural Objects, 5 International Journal Cul-.. tural Property

open-source analysis toolkit for Java programs. It operates either on Java source code or byte- code. It allows developers to analyze and transform programs. For instance,

It will be proven that the infinite number of tag systems covered by the three main cases for which #1 ≥ n I (for Case I), #1 ≥ n II (for Case II) and #1 ≥ n III (for Case III)

Impact of grape variety, berry maturity and size on the extractability of skin polyphenols during model wine-like maceration experiments... Poncet-Legrand Céline (Orcid

In this paper, through the lens of a theoretical framework, we have compared the OGD publishing process groups of two cities: Namur (Belgium) and Link¨ oping (Sweden). This