2020
DOI: 10.1016/j.procs.2020.09.053
|View full text |Cite
|
Sign up to set email alerts
|

Identification of library functions statically linked to Linux malware without symbols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…A comprehensive survey of static detection methods for IoT malware was conducted by Ngo et al [ 4 ]. The authors objectively evaluated the existing static analysis methods using the same dataset and experimental setup as all other competitor methods.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A comprehensive survey of static detection methods for IoT malware was conducted by Ngo et al [ 4 ]. The authors objectively evaluated the existing static analysis methods using the same dataset and experimental setup as all other competitor methods.…”
Section: Related Workmentioning
confidence: 99%
“…Rapid advances in software development techniques allow the source code of malware to be compiled into different executable programs tailored to different central processing unit (CPU) architectures via toolchains [ 4 ]. In addition to accelerating the spread of IoT malware, this also means that malware detection methods [ 5 , 6 ] based on a single CPU architecture do not meet the analysis requirements any longer.…”
Section: Introductionmentioning
confidence: 99%