2017
DOI: 10.1007/978-3-319-51963-0_37
|View full text |Cite
|
Sign up to set email alerts
|

Characterising Malicious Software with High-Level Behavioural Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…First, we investigated what kinds of data are provided by the service and which of them have a potential for determining whether behavioural patterns are present among samples of the same type of malware. We succeeded in our efforts and behavioural patterns on high-level of abstraction have been found [7]. The research continued with advanced inspection of data from malware analyses that we gathered.…”
Section: High-level Malware Behavioural Patternsmentioning
confidence: 92%
See 3 more Smart Citations
“…First, we investigated what kinds of data are provided by the service and which of them have a potential for determining whether behavioural patterns are present among samples of the same type of malware. We succeeded in our efforts and behavioural patterns on high-level of abstraction have been found [7]. The research continued with advanced inspection of data from malware analyses that we gathered.…”
Section: High-level Malware Behavioural Patternsmentioning
confidence: 92%
“…As it turned out, there were groups of distinct malicious samples, belonging to the same types of infiltrations (malware signatures), which performed actions according to some pattern. In our initial [7] we used formal notation to define high-level behavioural patterns as 12-tuple p label of elements:…”
Section: High-level Malware Behavioural Patternsmentioning
confidence: 99%
See 2 more Smart Citations