Author of the publication

Memory behavior-based automatic malware unpacking in stealth debugging environment.

, , and . MALWARE, page 39-46. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Provider-Provisioned Website Protection Scheme against Malware Distribution., , , and . IEICE Trans. Commun., 93-B (5): 1122-1130 (2010)Investigation and analysis of malware on websites., , , and . WSE, page 73-81. IEEE Computer Society, (2010)Scalable Detection of SIP Fuzzing Attacks., and . SECURWARE, page 114-119. IEEE Computer Society, (2008)Controlling malware HTTP communications in dynamic analysis system using search engine., , , and . CSS, page 1-6. IEEE, (2011)Life-cycle monitoring scheme of malware download sites for websites., , , and . SOCA, page 1-6. IEEE Computer Society, (2010)Memory behavior-based automatic malware unpacking in stealth debugging environment., , and . MALWARE, page 39-46. IEEE Computer Society, (2010)Virtual smartphone over IP., and . WOWMOM, page 1-6. IEEE Computer Society, (2010)Intelligent High-Interaction Web Honeypots Based on URL Conversion Scheme., , , and . IEICE Trans. Commun., 94-B (5): 1339-1347 (2011)Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks., , , , and . IEICE Trans. Commun., 93-B (5): 1131-1139 (2010)Using Call Patterns to Detect Unwanted Communication Callers., , and . SAINT, page 64-70. IEEE Computer Society, (2009)