[1]
Lin J Y, Pao H. Multi-View Malicious Document Detection[C]/ 2013 Conference on Technologies and Applications of Artificial Intelligence, 2013: 170-175.
DOI: 10.1109/taai.2013.43
Google Scholar
[2]
Ratanaworabhan P, Livshits V B, Zorn B G. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks[C]/USENIX Security Symposium. 2009: 169-186.
Google Scholar
[3]
Curtsinger C, Livshits B, Zorn B G, et al. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection[C]/USENIX Security Symposium. 2011: 33-48.
Google Scholar
[4]
Akritidis P, Markatos E P, Polychronakis M, et al. Stride: Polymorphic sled detection through instruction sequence analysis [M]/Security and Privacy in the Age of Ubiquitous Computing. Springer US, 2005: 375-391.
DOI: 10.1007/0-387-25660-1_25
Google Scholar
[5]
Roesch M. Snort: Lightweight Intrusion Detection for Networks[C]/LISA. 1999, 99: 229-238.
Google Scholar
[6]
Maiorca D, Giacinto G, Corona I. A pattern recognition system for malicious pdf files detection [M]/Machine Learning and Data Mining in Pattern Recognition. Springer Berlin Heidelberg, 2012: 510-524.
DOI: 10.1007/978-3-642-31537-4_40
Google Scholar
[7]
Foster J C. Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals: Reverse Engineering Exploits and Tool Coding for Security Professionals [M]. Syngress, (2005).
DOI: 10.1016/b978-159749005-4/50016-x
Google Scholar
[8]
Flanagan D. JavaScript: the definitive guide [M]. O'Reilly Media, Inc., 2006: 214.
Google Scholar
[9]
Gu B, Zhang W, Bai X, et al. JSGuard: Shellcode Detection in JavaScript [M]/Security and Privacy in Communication Networks. Springer Berlin Heidelberg, 2013: 112-130.
DOI: 10.1007/978-3-642-36883-7_8
Google Scholar
[10]
Bayer U, Moser A, Kruegel C, et al. Dynamic analysis of malicious code [J]. Journal in Computer Virology, 2006, 2(1): 67-77.
DOI: 10.1007/s11416-006-0012-2
Google Scholar
[11]
MOZILLA DEVELOPER NETWORK. https: /developer. mozilla. org/en-US/docs/SpiderMonkey/1. 8. 8#Platform_support.
Google Scholar
[12]
Schmitt F, Gassen J, Gerhards-Padilla E. PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents[C]/Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on. IEEE, 2012: 104-111.
DOI: 10.1109/pst.2012.6297926
Google Scholar
[13]
Lu X, Zhuge J, Wang R, et al. De-obfuscation and Detection of Malicious PDF Files with High Accuracy[C]/System Sciences (HICSS), 2013 46th Hawaii International Conference on. IEEE, 2013: 4890-4899.
DOI: 10.1109/hicss.2013.166
Google Scholar
[14]
Libemu – x86 Shellcode Emulation. http: /libemu. carnivore. it.
Google Scholar