Semantic Scholar uses AI to extract papers important to this topic.
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild… Expand Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large… Expand In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered… Expand This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the work is to recover intermediate… Expand A great deal of software is distributed in the form of executable code. The ability to reverse engineer such executables can… Expand Malicious code detection is a crucial component of any defense mechanism. In this paper, we present a unique viewpoint on… Expand A program suite for one-dimensional small-angle scattering data processing running on IBM-compatible PCs under Windows 9x/NT/2000… Expand A serious security threat today is malicious executables, especially new, unseen malicious executables often arriving as email… Expand In many standards track documents several words are used to signify the requirements in the specification. These words are often… Expand This paper reports on an effort to develop an integrated set of diagrammatic languages for modeling object-oriented systems, and… Expand