DOI: 10.31979/etd.ez5v-x8jc
|View full text |Cite
|
Sign up to set email alerts
|

Code Obfuscation and Virus Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(27 citation statements)
references
References 2 publications
0
27
0
Order By: Relevance
“…6, we partitioned the collected dataset in 5KB size range. The partition size is based on the study that size of any two malwares generated by G2 [5], PS-MPC [6] and NGVCK [28] kits does not vary by more than 5 KB size ( fig. 5).…”
Section: Partitioning Methodsmentioning
confidence: 99%
“…6, we partitioned the collected dataset in 5KB size range. The partition size is based on the study that size of any two malwares generated by G2 [5], PS-MPC [6] and NGVCK [28] kits does not vary by more than 5 KB size ( fig. 5).…”
Section: Partitioning Methodsmentioning
confidence: 99%
“…On the other hand, knowing that "hello world" was printed to the screen a million instructions ago provides little information about the probability of the next instruction. Hidden Markov models (HMMs) are perhaps the most widely used type of Markov models [102] and have been particularly useful in code analysis including recognition of metamorphic viruses [55], [104]- [111]. HMMs assume that latent variables, which take on states, are linked in a Markov chain with conditional dependencies on the previous states.…”
Section: Feature Space Models Vs State Space Modelsmentioning
confidence: 99%
“…the Forward-Backward algorithm), which iterates between forward and backward passes and an update step until the likelihood of the observed sequence O is maximized with respect to the model. The usage of HMMs for metamorphic virus detection has been documented in [55], [104]- [111]. 2 These works assume a predominantly decrypted virus body, i.e., little to no encryption within the body to begin with, or that a previously encrypted metamorphic has been decrypted inside an emulator.…”
Section: Feature Space Models Vs State Space Modelsmentioning
confidence: 99%
“…Benign programs programs Building the datasets The promising features of the executables are obtained by clubbing the dataset in 5 KB size of 100 groups [1] as in the collected dataset ~97.18% malware are below 500 KB ( Figure 2) and the difference between the sizes of any two malware generated by popular advanced malware kits viz. NGVCK [32], PS-MPC [33] and G2 [34] are within 5 KB. Hence, the features obtained will have a signature of maximum executables to detect the unknown malware.…”
Section: Malwarementioning
confidence: 99%