À̿͸ðÅäÄ«ÁîŰÀÇ ÀÚ¿ø
English
Japanese
Chinese(Simplified)
Chinese(Traditional)
(2024³â11¿ù15ÀÏ °»½Å)
Àڱ⠼Ұ³
(2024³â11¿ù15ÀÏ °»½Å)
°æÇöÄ¡
(2020³â4¿ù7ÀÏ °»½Å)
PGP°ø°³¿¼è
(2013³â5¿ù19ÀÏ °»½Å)
¿¬±¸
ÁÖÀú
³í¹®Áö
The Method for Shellcode Extraction from Malicious Document File Using Entropy and Emulation
Malware Classification Based on Extracted API Sequence by Static Analysis
±¹Á¦È¸ÀÇ
Malware Classification based on Extracted API Sequences using Static Analysis
½ÉÆ÷Áö¾ö, ¿¬±¸È¸
Verification of NCD-based clustering for extracting information to disable IoT malware
Survey of False-Positive by Antivirus Software and Proposal of the Countermeasures
Survey Analysis of Anti Virtual Machine Functions in Malicious Software
Proposal for Shellcode Extraction from Malicious Document File
Proposal for Automated Method to Narrow Down to Suspicious Android Application by Comparing Control Flow Graph
Evaluation of Android Malware Detection Method without Code Analysis
Detection Method for Android Malware by comparing Control Flow Graphs
Detection Method for Android Malware by using Control Flow Analysis
Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking
Investigation on Results of Malware Classification based on the Static Analysis
API Sequence Extraction and Cluster Analysis for Malware Codes based on the Static Analysis
A Classification and Static Analysis for Malware Codes based on the Call Graph and the Control Flow
Classification and feature extraction by using computer virus static analysis
°øÀú
³í¹®Áö
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware
Proposal of Long-term Observation Method of Financial Malware Combining Static Analysis and Behavior Observation
±¹Á¦È¸ÀÇ
Proposal of the IoT malware-disabling method
½ÉÆ÷Áö¾ö, ¿¬±¸È¸
Identification of user-defined functions based on function call sequence
Attack trend analysis of IoT malware based on surface and dynamic analysis
IoT Malware Static Analysis for Automated Extraction of Disabling Information
A Report of Tracing Potentially Risky Apps by Using the Framework for Monitoring Web-Based Attacks Targeting Smartphone
Automated Extraction of Kill Commands for Disabling IoT Malware
A Study of Web Pages Distributing Android Applications Shared in Twitter and Consideration of a Detecting Method
A Study on Detection of Malicious JavaScript Based on Source Code Similarity
A Study of Android Applications Shared in Social Network Services
A Study on Classification of Malicious JavaScript Based on Source Code Similarity
Development of Dynamic Analysis Tool that Avoid of Anti Virtual Machine Function on Malicious Software
Research on Attack Methods of Online Banking Malware Based on Static Analysis and Behavior Observation
Induction of Sending Private Information Based on Function Distance in Android Application Bytecode
Feasibility study of Observable Expression for Cyber Attack Countermeasure
¸ÞÀÏ
iwm@maid.org