[1]
Symantec Corpration. Symantec global internet security threat report [J/OL] 2008, http: /eval. symantec. com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiv_04-2009. en-us. pdf.
DOI: 10.1016/s1353-4858(00)03015-4
Google Scholar
[2]
CHRISTODORESCU M., JHA S., SESHIA S. A., et al. Semantics-aware malware detection; proceedings of IEEE Symposium on the Security and Privacy, 2005 [C].
DOI: 10.1109/sp.2005.20
Google Scholar
[3]
BAYER Ulrich, KRUEGEL Christopher, KIRDA Engin. TTAnalyze: A tool for analyzing malware; proceedings of the 15th European Institute for Computer Antivirus Research (EICAR 2006) Annual Conference, F, 2006 [C].
Google Scholar
[4]
WILLEMS C., HOLZ T., FREILING F. Toward Automated Dynamic Malware Analysis Using CWSandbox [J]. Security & Privacy, IEEE, 2007, 5(2): 32-9.
DOI: 10.1109/msp.2007.45
Google Scholar
[5]
DINABURG Artem, ROYAL Paul, SHARIF Monirul, et al. Ether: malware analysis via hardware virtualization extensions [M]. Proceedings of the 15th ACM conference on Computer and communications security. Alexandria, Virginia, USA; ACM. 2008: 51-62.
DOI: 10.1145/1455770.1455779
Google Scholar
[6]
Microsoft Corporation. Microsoft security intelligence report (SIR) [J/OL] 2013, http: /www. microsoft. com/security/sir/archive/default. aspx.
Google Scholar
[7]
MOSER A., KRUEGEL C., KIRDA E. Limits of Static Analysis for Malware Detection; proceedings of the Computer Security Applications Conference, 2007 ACSAC 2007 Twenty-Third Annual, F 10-14 Dec. 2007, 2007 [C].
DOI: 10.1109/acsac.2007.21
Google Scholar
[8]
RIECK Konrad, HOLZ Thorsten, WILLEMS Carsten, et al. Learning and Classification of Malware Behavior [M]/ZAMBONI D. Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg. 2008: 108-25.
DOI: 10.1007/978-3-540-70542-0_6
Google Scholar
[9]
BAYER Ulrich, COMPARETTI Paolo Milani, HLAUSCHEK Clemens, et al. Scalable, Behavior-Based Malware Clustering; proceedings of the NDSS, F, 2009 [C]. Citeseer.
Google Scholar
[10]
RIECK Konrad, TRINIUS Philipp, WILLEMS Carsten, et al. Automatic analysis of malware behavior using machine learning [J]. Journal of Computer Security, 2011, 19(4): 639-68.
DOI: 10.3233/jcs-2010-0410
Google Scholar
[11]
KIRDA Engin, KRUEGEL Christopher, BANKS Greg, et al. Behavior-based spyware detection; proceedings of the Proceedings of the 15th USENIX Security Symposium, F, 2006 [C].
Google Scholar
[12]
CHRISTODORESCU Mihai, JHA Somesh, KRUEGEL Christopher. Mining specifications of malicious behavior [M]. Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. Dubrovnik, Croatia; ACM. 2007: 5-14.
DOI: 10.1145/1287624.1287628
Google Scholar
[13]
PARK Younghee, REEVES Douglas S., STAMP Mark. Deriving common malware behavior through graph clustering [J]. Computers & Security, 2013, 39, Part B(0): 419-30.
DOI: 10.1016/j.cose.2013.09.006
Google Scholar
[14]
QIAN Huang, YING Wu Dong, YAN Sun Xiao. Hierarchical method to analyze malware behavior [J]. Journal of Computer Applications, 2010, 30(4): 1048-52.
DOI: 10.3724/sp.j.1087.2010.01048
Google Scholar