2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) 2016
DOI: 10.1109/ficloud.2016.21
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious Portable Executables Using Evidence Combinational Theory with Fuzzy Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…First, objects of the same type are selected by the ObjectType feature of Object. Then, they are compared using FuzzyHash [49,50] using the ObjectHash feature. The idea of such a hash is that it allows you to compare objects with similar content (Algorithm 7).…”
Section: Algorithm For F_6mentioning
confidence: 99%
“…First, objects of the same type are selected by the ObjectType feature of Object. Then, they are compared using FuzzyHash [49,50] using the ObjectHash feature. The idea of such a hash is that it allows you to compare objects with similar content (Algorithm 7).…”
Section: Algorithm For F_6mentioning
confidence: 99%
“…Although the detection rates are not high, the scoring approach proposes a method of allowing a malware analyst in classifying malware based on urgency. In the quest to build a more resilient cyber space, this work further explores and expands the approach introduced in [22] and is an extension of our previous work presented in [23].…”
Section: Related Workmentioning
confidence: 99%
“…Y. Li proved that the Fuzzy hashing algorithm is practically applicable to malicious code similarity analysis, and that it can be practically used for malicious code similarity analysis by evaluating the fuzzy hashing algorithms in the public malware dataset as a comprehensive framework [1]. AP Namanya proposed a proof-of-concept technique to detect similarity of files based on a similarity percentage between known and unknown to reduce the effect of obfuscation techniques of fuzzy hashing [2]. S. Gupta proposed a framework for linking malicious code with the Fuzzy Hashing algorithm by constructing high-level Category Sequences by extracting Windows API Call Sequences for each malicious code group and mapping the API to 26 categories [3].…”
Section: Similarity Based Malware Analysismentioning
confidence: 99%