Research Article
A Malware and Variant Detection Method Using Function Call Graph Isomorphism
| Input: are labeled directed graphs. | | Output: | | if then | | return false; | | else if then | | return false; | | else | | for each | | | | return false; | | end if | | end for each | | end if | | return true; |
|