Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Opcode

Known as: Instruction opcode, Opcodes, Operation code 
In computing, an opcode (abbreviated from operation code, also known as instruction syllable or opstrings.) is the portion of a machine language… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
In this research, we compare malware detection techniques based on static, dynamic, and hybrid analysis. Specifically, we train… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Malware can be defined as any type of malicious code that has the potential to harm a computer or network. The volume of malware… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In this paper, we consider a method for computing the similarity of executable files, based on opcode graphs. We apply this… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
In previous studies classification algorithms were employed successfully for the detection of unknown malicious code. Most of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The recent growth in network usage has motivated the creation of new malicious code for various purposes, including economic ones… Expand
  • figure 1
  • figure 3
  • figure 6
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2007
Highly Cited
2007
  • D. Bilar
  • Int. J. Electron. Secur. Digit. Forensics
  • 2007
  • Corpus ID: 15341737
This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions. A total of 67… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In this paper, we present a polymorphic processor paradigm incorporating both general-purpose and custom computing processing… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The coarse-grained reconfigurable architectures have advantages over the traditional FPGAs in terms of delay, area and… Expand
Is this relevant?
Highly Cited
1996
Highly Cited
1996
From the Publisher: The nucleus of the Java 2 platform, the Java virtual machine is the technology that enables the Java 2… Expand
  • table 2.1
  • table 2.2
  • table 2.3
  • table 4.1
  • table 4.3
Is this relevant?