Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research 2010
DOI: 10.1145/1852666.1852716
|View full text |Cite
|
Sign up to set email alerts
|

Fast malware classification by automated behavioral graph matching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
86
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 147 publications
(92 citation statements)
references
References 13 publications
0
86
0
1
Order By: Relevance
“…Classification of malware variants has been concerned by analysts in a long period [11][12][13][14]. Evolving malware generates a lot of variants and brings great challenges to analytical work.…”
Section: Methodsmentioning
confidence: 99%
“…Classification of malware variants has been concerned by analysts in a long period [11][12][13][14]. Evolving malware generates a lot of variants and brings great challenges to analytical work.…”
Section: Methodsmentioning
confidence: 99%
“…Park et al [23] presented a malware detection system which uses system call and their parameters values as the features and generates directed subgraph for each programs behavior during execution. It creates a maximal behavior subgraph for measuring their similarity between their programs and known malware families.…”
Section: Feature Extraction Methodsmentioning
confidence: 99%
“…The monitor utilizes time-based view of kernel objects to analyze traces of kernel execution [17]. Other studies trace malware behaviour exhibited by installer and uninstaller software as a way to avoid false positives [18], and suggest a new categorization method for malware based on maximal common subgraph detection [19].…”
Section: Figure 1 Organization Of Malware Detectionmentioning
confidence: 99%
“…After that, minimization is applied to the call graph turning it into a code graph to speed up the analysis and comparison process. Other researchers use the same approach by using 4-tuple nodes to denote a system call, edges, the dependencies between two system calls and a label for nodes and edges [19]. Some other studies use graph nodes to denote kernel objects instead of system calls [23].…”
Section: Figure 1 Organization Of Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation