8Rabek J C, Khazan R 5, Lewandowski S M, et al. Detection of Injected, Dynamically Generated and Obfuscated Malicious Code[C]//Proc. of the 2003 ACM Workshop on Rapid Malcode. New York, USA: ACM Press, 2003: 76-82.
9Cohen F. Computer Virus Theory and Experiments[J]. Computer & Security, 1987, 6(1): 22-35.
10H.Kim,B.Karp,“Autograph:Toward auto-mated,distributed worm signature detection”,Proceedings of the 13th Usenix Security Symposium[J],2004