Synthesizing near-optimal malware specifications from suspicious behaviors

Author(s):  
Somesh Jha ◽  
Matthew Fredrikson ◽  
Mihai Christodoresu ◽  
Reiner Sailer ◽  
Xifeng Yan
Sign in / Sign up

Export Citation Format

Share Document