ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Malware Visualization and Similarity via Tracking Binary Execution Path
Tehnicki vjesnik - Technical Gazette
◽
10.17559/tv-20210820065715
◽
2022
◽
Vol 29
(1)
◽
Keyword(s):
Execution Path
Download Full-text
Related Documents
Cited By
References
Metrinome: Path Complexity Predicts Symbolic Execution Path Explosion
2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
◽
10.1109/icse-companion52605.2021.00028
◽
2021
◽
Author(s):
Gabriel Bessler
◽
Josh Cordova
◽
Shaheen Cullen-Baratloo
◽
Sofiane Dissem
◽
Emily Lu
◽
...
Keyword(s):
Symbolic Execution
◽
Execution Path
Download Full-text
Execution Path Classification for Vulnerability Analysis and Detection
E-Business and Telecommunications - Communications in Computer and Information Science
◽
10.1007/978-3-319-30222-5_14
◽
2016
◽
pp. 293-317
Author(s):
George Stergiopoulos
◽
Panagiotis Katsaros
◽
Dimitris Gritzalis
Keyword(s):
Vulnerability Analysis
◽
Execution Path
Download Full-text
Gradual Removal of QoS Constraint Violations by Employing Recursive Bargaining Strategy for Optimizing Service Composition Execution Path
2009 IEEE International Conference on Web Services
◽
10.1109/icws.2009.39
◽
2009
◽
Cited By ~ 2
Author(s):
Kaijun Ren
◽
Nong Xiao
◽
Junqiang Song
◽
Chi Yang
◽
Min Zhu
◽
...
Keyword(s):
Service Composition
◽
Execution Path
Download Full-text
Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis
Journal of the Korea Institute of Information Security and Cryptology
◽
10.13089/jkiisc.2016.26.2.377
◽
2016
◽
Vol 26
(2)
◽
pp. 377-386
Author(s):
Ho Hwang
◽
Daesung Moon
◽
Ikkun Kim
Keyword(s):
Malware Analysis
◽
Execution Path
Download Full-text
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data
Research in Attacks, Intrusions, and Defenses - Lecture Notes in Computer Science
◽
10.1007/978-3-030-00470-5_21
◽
2018
◽
pp. 445-464
Author(s):
Stefano Cristalli
◽
Edoardo Vignati
◽
Danilo Bruschi
◽
Andrea Lanzi
Keyword(s):
Execution Path
Download Full-text
Execution Path Profiling for OS Device Drivers: Viability and Methodology
Service Availability - Lecture Notes in Computer Science
◽
10.1007/978-3-540-68129-8_9
◽
2008
◽
pp. 90-109
◽
Cited By ~ 4
Author(s):
Constantin Sârbu
◽
Andréas Johansson
◽
Neeraj Suri
Keyword(s):
Device Drivers
◽
Execution Path
◽
Path Profiling
Download Full-text
A Dynamic Execution Path Selection Approach for Composite Services in MANETs
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing
◽
10.1109/wicom.2008.586
◽
2008
◽
Author(s):
Weiyu Chen
◽
Yinan Jing
◽
Jingjing Wu
◽
Weiwei Sun
Keyword(s):
Path Selection
◽
Execution Path
◽
Selection Approach
◽
Composite Services
◽
Dynamic Execution
Download Full-text
Behavior Analysis via Execution Path Clusters
MILCOM 2013 - 2013 IEEE Military Communications Conference
◽
10.1109/milcom.2013.169
◽
2013
◽
Cited By ~ 1
Author(s):
Rebecca Cathey
◽
Gregory Frazier
◽
Michael Weber
Keyword(s):
Behavior Analysis
◽
Execution Path
Download Full-text
An algorithm for keyword search on an execution path
2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)
◽
10.1109/csmr-wcre.2014.6747187
◽
2014
◽
Cited By ~ 1
Author(s):
Toshihiro Kamiya
Keyword(s):
Keyword Search
◽
Execution Path
Download Full-text
Optimizing execution path of scientific workflow by gradual removal of QoS constraint violations in Reverse Order
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.1464
◽
2009
◽
Vol 21
(16)
◽
pp. 2033-2051
◽
Cited By ~ 1
Author(s):
Kaijun Ren
◽
Jinjun Chen
Keyword(s):
Scientific Workflow
◽
Reverse Order
◽
Execution Path
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close