共 36 条
- [1] TAMADA H, OKAMOTO K, NAKAMURA M, Et al., Dynamic software birthmarks to detect the theft of Windows applications, International Symposium on Future Software Technology, (2004)
- [2] PFEFFER A, CALL C, CHAMBERLAIN J, Et al., Malware analysis and attribution using genetic information, 7th International Conference on Malicious and Unwanted Software, pp. 39-45, (2012)
- [3] RUTTENBERG B, MILES C, KELLOGG L, Et al., Identifying shared software components to support malware forensics[C], International Conference on Detection of Intrusions, Malware and Vulnerability Assessment, pp. 21-40, (2014)
- [4] BENCSATH B, PEK G, BUTTYAN L, Et al., The cousins of stuxnet:Duqu, Flame and Gauss[J], Future Internet, 4, 4, pp. 971-1003, (2012)
- [5] BENCSATH B, PEK G, BUTTYAN L, Et al., Duqu:A Stuxnet-like malware found in the wild, Hungary:CrySyS Lab Technical Report, 14, pp. 1-60, (2011)
- [6] GOSTEV A, KUZNETSOV I., Stuxnet/Duqu:The evolution of drivers
- [7] CHIEN E, OMURCHU L, FALLIERE N., Duqu:The precursor to the next Stuxnet, LEET 12:Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats, (2012)
- [8] AWAD Y, NASSAR M, SAFA H., Modeling malware as a language, IEEE International Conference on Communications (ICC), pp. 1-6, (2018)
- [9] LIU J R, SHEN Y, YAN H B., Functions-based CFG embedding for malware homology analysis, 26th International Conference on Telecommunications (ICT), pp. 220-226, (2019)
- [10] BAKER B S., On finding duplication and near-duplication in large software systems, Proceedings of 2nd Working Conference on Reverse Engineering, pp. 86-95, (1995)