2015
DOI: 10.1007/978-3-319-17822-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Partial Evaluation for Java Malware Detection

Abstract: Abstract. The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. To circumvent detection by anti virus (AV) software, obfuscation techniques are routinely applied to make an exploit more difficult to recognise. Popular obfuscation techniques for Java include string obfuscation and applying reflection to hide method calls; two techniques that can either be used together or independently. This paper shows h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
(14 reference statements)
0
1
0
Order By: Relevance
“…For instance, in the area of functional programming [Consel and Danvy 1993;Jones et al 1993;Turchin 1986] and logic programming (also known as partial deduction) [Gallagher 1993;Komorowski 1982;Lloyd and Shepherdson 1991;Pettorossi and Proietti 1994]. Also for imperative languages such as C [Consel et al 1998] and Java [Ji and Bubel 2012;Singh and King 2014], and in declarative languages such as Prolog [Leuschel and Bruynooghe 2002], Haskell [Jones 1990], and Curry [Albert et al 1999;Hanus and Peemöller 2014].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, in the area of functional programming [Consel and Danvy 1993;Jones et al 1993;Turchin 1986] and logic programming (also known as partial deduction) [Gallagher 1993;Komorowski 1982;Lloyd and Shepherdson 1991;Pettorossi and Proietti 1994]. Also for imperative languages such as C [Consel et al 1998] and Java [Ji and Bubel 2012;Singh and King 2014], and in declarative languages such as Prolog [Leuschel and Bruynooghe 2002], Haskell [Jones 1990], and Curry [Albert et al 1999;Hanus and Peemöller 2014].…”
Section: Introductionmentioning
confidence: 99%