PDF Download Link |
Presentation |
2009-11-13 11:05
Similarity Scoring Method of Runtime Packed Malware and its Evaluation Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) |
PDF Download Link |
ICSS2009-55 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
|