Back to Results
First PageMeta Content
Malware / Models of computation / Algorithm / Software bug / KeY / Control theory / Actor model / MS Antivirus / Denotational semantics / Theoretical computer science / Applied mathematics / Computing


Function Extraction Technology: Computing the Behavior of Malware Rick Linger, Kirk Sayre, Tim Daly, Mark Pleszkoch CERT, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA
Add to Reading List

Document Date: 2010-08-30 12:03:23


Open Document

File Size: 441,37 KB

Share Result on Facebook

City

Monterey / SIGMIS / Pittsburgh / Los Alimitos / Los Alamitos / Reading / New York / /

Company

Oxford University Press / Cambridge University Press / IEEE Computer Society Press / Los Vegas NV / Function Extraction Technology / Intel / John Wiley & Sons / Embedded Systems / /

/

Facility

library of SRTs / Carnegie Mellon University / Software Engineering Institute / Software Engineering Institute Carnegie Mellon University / /

IndustryTerm

mathematical processing / frontier propagation algorithm / legacy software / behavior computation technology / computing / software behavior computation / software testing / legitimate software / software development / /

Organization

Cambridge University / Software Engineering Institute / Software Engineering Institute Carnegie Mellon University Pittsburgh / CERT / Carnegie Mellon University / Oxford University / /

Person

Addison Wesley / Mark Pleszkoch / Tim Daly / Kirk Sayre / /

Position

Engineer / programmer / /

ProvinceOrState

Pennsylvania / Mississippi / Hawaii / New York / California / Massachusetts / /

Technology

behavior computation technology / same algorithm / FX technology / frontier propagation algorithm / /

SocialTag