Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359808
|View full text |Cite
|
Sign up to set email alerts
|

Eiger

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…-More than ten anti-virus engines detected as malicious (to extract samples with high certainty as malware; established with reference to [11])…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…-More than ten anti-virus engines detected as malicious (to extract samples with high certainty as malware; established with reference to [11])…”
Section: Datasetmentioning
confidence: 99%
“…as an allow list. A method called EIGER [11] creates signatures based on dynamic analysis of logs of malware and is configured to have no effect on the behavior logs of public Windows applications. Although these methods consider the influence of normal communication, the same as SIGMA, normal communication is limited to general applications.…”
Section: Related Workmentioning
confidence: 99%
“…NTT Secure Platform Laboratories is researching and developing malware-analysis technology that comprehensively identifies the behavior of malware that has various anti-analysis functions. The automatic IOC generation technology [1] introduced here generates an IOC with high detection accuracy, coverage, and interpretability by using the behavior logs extracted with that malware-analysis technology as input. Specifically, an IOC is generated by the following procedure (Fig.…”
Section: Automatic Generation Of Iocmentioning
confidence: 99%