![Malware / Models of computation / Algorithm / Software bug / KeY / Control theory / Actor model / MS Antivirus / Denotational semantics / Theoretical computer science / Applied mathematics / Computing Malware / Models of computation / Algorithm / Software bug / KeY / Control theory / Actor model / MS Antivirus / Denotational semantics / Theoretical computer science / Applied mathematics / Computing](https://www.pdfsearch.io/img/5222d0fff913e7dd1d01f5f8ba193c9c.jpg) Date: 2010-08-30 12:03:23Malware Models of computation Algorithm Software bug KeY Control theory Actor model MS Antivirus Denotational semantics Theoretical computer science Applied mathematics Computing | | Function Extraction Technology: Computing the Behavior of Malware Rick Linger, Kirk Sayre, Tim Daly, Mark Pleszkoch CERT, Software Engineering Institute Carnegie Mellon University Pittsburgh, PAAdd to Reading ListSource URL: daly.axiom-developer.orgDownload Document from Source Website File Size: 441,37 KBShare Document on Facebook
|