Back to Results
First PageMeta Content
Tree automaton / Malware / Tree / Directed acyclic graph / Graph coloring / Graph theory / Automata theory / Theoretical computer science


Malware Analysis with Tree Automata Inference ⋆ Domagoj Babi´c, Daniel Reynaud, and Dawn Song University of California, Berkeley {babic, reynaud, dawnsong}@cs.berkeley.edu Abstract. The underground malware-based econ
Add to Reading List

Document Date: 2013-03-28 20:19:28


Open Document

File Size: 403,25 KB

Share Result on Facebook

Company

Air Force Research Laboratory / /

/

Facility

Air Force Research Laboratory / Dawn Song University of California / /

IndustryTerm

industrial systems / inference algorithm / leap mining / basic formal machinery / similar algorithms / structural leap mining / software behavior / inference algorithms / formal machinery / potential solution / banking / antivirus tools / industrial manufacturing / progress exploiting software flaws / freelyavailable randomized obfuscation tools / industrial hardware / simpler algorithm / /

Organization

office of Naval Research / National Science Foundation / Natural Sciences and Engineering Research Council of Canada PDF / University of California / Berkeley / /

Person

Root Keys (Hashes) / Malicious Signatures / Daniel Reynaud / /

/

Position

first author / head / /

ProvinceOrState

Oregon / /

Technology

encryption / 4.2 Inference Algorithm / inference algorithms / CAV / provided algorithms / inference algorithm / simpler algorithm / dom / PDF / /

SocialTag