Malicious code behavior detection based on reverse engineering
碩士 === 國立雲林科技大學 === 資訊管理系碩士班 === 99 === In the past few years, the amount of the malicious program and the capability of destruction have become more and more. Malicious programs and their writers are also staring to use the packed technology of encryption and code obfuscation to avoid the detection...
Main Authors: | Ting-Hong Lin, 林庭弘 |
---|---|
Other Authors: | none |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09643577328460372959 |
Similar Items
-
Malicious Code Detection Based on Code Semantic Features
by: Yu Zhang, et al.
Published: (2020-01-01) -
Detecting Malicious Behavior of Process Injection
by: Ze-yu Lin, et al.
Published: (2018) -
A Study of Malicious Code Detection
by: Dy Wu, et al.
Published: (2013) -
A Study of Malicious Code Detection
by: Dy Wu, et al.
Published: (2013) -
Study of Behavior Model and Detection Technique for Information Hiding-Based Malicious Code
by: Tien-Tzu Chiang, et al.
Published: (2007)