TrendLabs: Malware Classification with ‘Graph Hash,’ Applied to the Orca Cyberespionage Campaign
Figure 1. An example of a call graph plotted via Interactive Disassembler Pro (IDA Pro)
REF: https://blog.trendmicro.com/trendlabs-security-intelligence/malware-classification-with-graph-hash-applied-to-the-orca-cyberespionage-campaign/
沒有留言:
張貼留言