Inproceedings,

Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract).

, and .
DIMVA, volume 8550 of Lecture Notes in Computer Science, page 41-50. Springer, (2014)

Meta data

Tags

Users

  • @dblp

Comments and Reviews