2013
DOI: 10.1007/978-3-642-39235-1_3
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Discriminatory Features for Automated Malware Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
34
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(36 citation statements)
references
References 20 publications
2
34
0
Order By: Relevance
“…We use two different aspects of the instructions, the first one is instruction opcode and the second one is instruction category. Instruction opcode is one of the features previously used for static malware detection [52,54,10,67]. However, it is not common to use the opcodes for dynamic detection of malware.…”
Section: Features Related To Instructionsmentioning
confidence: 99%
See 2 more Smart Citations
“…We use two different aspects of the instructions, the first one is instruction opcode and the second one is instruction category. Instruction opcode is one of the features previously used for static malware detection [52,54,10,67]. However, it is not common to use the opcodes for dynamic detection of malware.…”
Section: Features Related To Instructionsmentioning
confidence: 99%
“…Bilar et al [10] examine the frequency of opcode use in malware. Santos et al and Yan et al evaluate opcode sequence signatures [54,67], while in particular, opcode sequence signatures were found to effectively classify metamorphic malware. Runwal et al [52] study opcode sequence similarity graphs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Bilar et al use the frequency of opcodes that a specific program uses [3]. Others use sequence signatures of the opcodes [28,34]. Runwal et al use similarity graphs of opcode sequences [27].…”
Section: Related Workmentioning
confidence: 99%
“…Code coverage can be increased with proper code-stimulation techniques, at the price of an increased complexity, and by relying on hardware-level introspection. As shown by a recent quantitative analysis [40], a combination of static and dynamic analysis, creating so-called hybrid approaches, is the key to achieve the best recall and precision. We observe that previous work revolve around the concept of behavior [16,26], which is leveraged as the bridge between static an dynamic techniques.…”
Section: Binary Analysis and Reverse Engineeringmentioning
confidence: 99%