Opcode

Known as: Instruction opcode, Opcodes, Operation code 
In computing, an opcode (abbreviated from operation code, also known as instruction syllable or opstrings.) is the portion of a machine language… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
With the wide diffusion of smartphones and their usage in a plethora of processes and activities, these devices have been… (More)
  • table I
  • table II
  • table III
Is this relevant?
2014
2014
Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2014
2014
Opcode sequences from decompiled executables have been employed to detect malware. Currently, opcode sequences are extracted… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Malware can be defined as any type of malicious code that has the potential to harm a computer or network. The volume of malware… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In this paper, we consider a method for computing the similarity of executable files, based on opcode graphs. We apply this… (More)
  • figure 1
  • figure 3
  • table 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
In previous studies classification algorithms were employed successfully for the detection of unknown malicious code. Most of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The recent growth in network usage has motivated the creation of new malicious code for various purposes, including economic ones… (More)
  • figure 1
  • figure 3
  • figure 6
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2007
Highly Cited
2007
This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions. A total of 67… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The coarse-grained reconfigurable architectures have advantages over the traditional FPGAs in terms of delay, area and… (More)
Is this relevant?