On the Limits of Information Flow Techniques for Malware Analysis and Containment
dc.contributor.author | Cavallaro, Lorenzo | de |
dc.contributor.author | Saxena, Prateek | de |
dc.contributor.author | Sekar, R. | de |
dc.date.accessioned | 2009-07-29T15:16:24Z | |
dc.date.available | 2009-07-29T15:16:24Z | |
dc.date.issued | 2009-07-29T15:16:24Z | |
dc.identifier.uri | http://hdl.handle.net/2003/26285 | |
dc.identifier.uri | http://dx.doi.org/10.17877/DE290R-2933 | |
dc.language.iso | en | de |
dc.relation.ispartof | DIMVA 2008, July 10-11, 2008, Paris, France | en |
dc.relation.uri | http://dx.doi.org/10.1007/978-3-540-70542-0_8 | de |
dc.subject.ddc | 004 | |
dc.title | On the Limits of Information Flow Techniques for Malware Analysis and Containment | en |
dc.type | Text | de |
dc.type.publicationtype | conferenceObject | de |
dcterms.accessRights | open access |
Files
Original bundle
1 - 1 of 1