Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer. Analyzing network traffic to detect self-decrypting exploit code. In Feng Bao, Steven Miller, editors, Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007. pages 4-12, ACM, 2007. [doi]
Abstract is missing.