2010 Second Cybercrime and Trustworthy Computing Workshop 2010
DOI: 10.1109/ctc.2010.11
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Malware Based on String and Function Feature Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(38 citation statements)
references
References 10 publications
0
38
0
Order By: Relevance
“…Since, precise and effective results are achieved by hybrid approach which eliminates the loopholes of each method. In [2,3,4] malware detection system employing hybrid features showed high accuracy and TPR in comparison with those using static and dynamic features.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Since, precise and effective results are achieved by hybrid approach which eliminates the loopholes of each method. In [2,3,4] malware detection system employing hybrid features showed high accuracy and TPR in comparison with those using static and dynamic features.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…They achieved a precise detection rate and low false positives compared to existing malware detection methods. In [2,3,4] investigated malware detection systems based on integrated static and dynamic analysis features using data mining approaches. An appropriate determination of malware variant depends on the feature type employed for discovering malicious activity.…”
Section: Introductionmentioning
confidence: 99%
“…Features that are commonly gleaned from a static analysis of malware include Portable Executable (PE) header metadata such as Dynamic Link Library (DLL) [21] and API calls [28], bytes sequences (or n-grams) [21,14,29], Operational Codes (OpCodes) [19,22,24], strings [21,25,12], and function length and function length frequency [26]. Strings-based techniques were shown to achieve high detection and classification accuracy compared to PE and n-grams based techniques [21,25].…”
Section: Related Workmentioning
confidence: 99%
“…The recent growth in high-speed internet connections and internet network services has led to an increase in the creation of new malicious code, mainly for the theft of personal information and recruitment of computers to botnets [2]. Moreover, malware designers apply sophisticated techniques to hide the presence of their creations in a computer system, making the problem of malware detection even more difficult [3].…”
Section: Introductionmentioning
confidence: 99%
“…There are several researches that are devoted to automated classification and analysis of malicious software. Paper [2] presents an effective algorithm, which uses a diversity of static feature selection methods to identify and classify malware families and distinguish malware from goodware. Study [15] proposes a classification method based on function level similarity comparison, which is founded on the observation that most malware variants are generated with metamorphic engines or malware generating tools and that those originated from the same program share most of their components.…”
Section: Introductionmentioning
confidence: 99%