您当前的位置:
首页 >
文章列表页 >
Attack signature generation by traceable dynamic taint analysis
Papers | 更新时间:2024-06-05
    • Attack signature generation by traceable dynamic taint analysis

    • Journal on Communications   Vol. 33, Issue 5, Pages: 21-28(2012)
    • DOI:1000-436X(2012)05-0021-08    

      CLC: TP399
    • Online First:2012-05

      Published:25 May 2012

    移动端阅览

  • Yu LIU, Mei-ning NIE, Pu-rui SU, et al. Attack signature generation by traceable dynamic taint analysis[J]. Journal on Communications, 2012, 33(5): 21-28. DOI: 1000-436X(2012)05-0021-08.

  •  
  •  

0

Views

1641

下载量

5

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Automatic exploitation generation method of write-what-where vulnerability
Homology analysis of malware based on graph
Fast reused code tracing method based on simhash and inverted index
Study on modern malware analysis system
Protocol format extraction at semantic level

Related Author

Purui SU
Yi YANG
Xiangkun JIA
Huafeng HUANG
Fu-dong LIU
Jing WANG
Jin HAN
Xi MENG

Related Institution

School of Computer Science and Technology, University of Chinese Academy of Sciences
Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences
State Key Laboratory of Mathematical Engineering &Advanced Computing
Institute of Information Engineering, Chinese Academy of Sciences
Graduate School,Chinese Academy of Sciences
0