2015
DOI: 10.1016/j.engappai.2015.05.008
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic VSA: a framework for malware detection based on register contents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 33 publications
0
22
0
Order By: Relevance
“…Also this objective has been deeply studied in literature, and several reviewed papers target the detection of variants. Given a malicious sample m, variants detection consists in selecting from the available knowledge base the samples that are variants of m [37,30,38,39,40,41].…”
Section: Malware Similarity Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Also this objective has been deeply studied in literature, and several reviewed papers target the detection of variants. Given a malicious sample m, variants detection consists in selecting from the available knowledge base the samples that are variants of m [37,30,38,39,40,41].…”
Section: Malware Similarity Analysismentioning
confidence: 99%
“…Supervised learning is the task of gaining knowledge by providing statistical models with correct instance examples, during a preliminary phase called training. The supervised algorithms used by reviewed papers are rule-based classifier [11,29,30,67,40,78,60,13], Bayes classifier [61,20,26,51,35], Naïve Bayes [11,12,15,26,51,67,35], Bayesian Network [21,61,20], Support Vector Machine (SVM) [12,13,15,16,65,66,48,49,61,20,24,26,31,29,51,52,53,67,35], Multiple Kernel Learning [18], Prototype-based Classification [57], Decision Tree [12,13,15,4...…”
Section: Supervised Learningmentioning
confidence: 99%
“…is called dynamic analysis. Before executing the malware sample, the appropriate monitoring tools like Process Monitor [13] and Capture BAT [14] (for file system and registry monitoring), Process Explorer [15] and Process Hackerreplace [16] (for process monitoring), Wireshark [17] (for network monitoring) and Regshot [18] (for system change detection) are installed and activated. Various techniques that can be applied to perform dynamic analysis include function call monitoring, function parameter analysis, information flow tracking, instruction traces and autostart extensibility points etc.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…Many studies use static analysis for malware detection using exact decompilation [16], similarity testing framework [17], based on register contents [18], using two-dimensional binary program features [19], subroutine based detection [20], statistics of assembly instructions [21], file relation graphs [22], de-anonymizing programmers via code stylometry [23], based upon a wavelet package technique [24], analysis and comparison of disassemblers for opcode [25].…”
mentioning
confidence: 99%
“…Malware is known as a malicious application that has been obviously considered to damage the networks and computers [2]. The malware detection design depends on a signature database [3,4]. For example, a file can be examined with comparison of its bytes using signatures database.…”
Section: Introductionmentioning
confidence: 99%