相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Malware Dynamic Analysis Evasion Techniques: A Survey
Amir Afianian et al.
ACM COMPUTING SURVEYS (2020)
From Hack to Elaborate Technique-A Survey on Binary Rewriting
Matthias Wenzl et al.
ACM COMPUTING SURVEYS (2019)
AIMED: Evolving Malware with Genetic Programming to Evade Detection
Raphael Labaca Castro et al.
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)
ARMED: How Automatic Malware Modifications Can Evade Static Detection?
Raphael Labaca Castro et al.
5TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2019) (2019)
Wild patterns: Ten years after the rise of adversarial machine learning
Battista Biggio et al.
PATTERN RECOGNITION (2018)
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
Ishai Rosenberg et al.
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018 (2018)