Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

behavior based detection

biblio

Visible to the public Bytecode Heuristic Signatures for Detecting Malware Behavior

Submitted by aekwall on Mon, 03/09/2020 - 11:13am
  • virtual machines
  • predictability
  • Security Heuristics
  • signature
  • reactive security solutions
  • proactive behavior heuristics
  • proactive approaches
  • malicious applications
  • heuristic
  • hash-based signatures
  • bytecode heuristic signatures
  • bytecode
  • behavior based detection
  • behavior
  • response time
  • Instruction sets
  • Monitoring
  • Computer languages
  • low performance overhead
  • Prototypes
  • malware behavior
  • computational complexity
  • Virtual machining
  • digital signatures
  • pubcrawl
  • Resiliency
  • invasive software
  • malware detection
  • security
  • malware
  • Scalability

Terms of Use  |  ©2023. CPS-VO