260 likes | 461 Views
Presentation Outline. OverviewBackgroundOur approachFeature descriptionFeature extractionExperimentsResultsConclusion. Overview. GoalDetecting Malicious ExecutablesContributionA new Model that combines Binary, Assembly, and Library Call featuresAn efficient technique to retrieve Assembly
E N D