2015 18th CSI International Symposium on Computer Architecture and Digital Systems (CADS) 2015
DOI: 10.1109/cads.2015.7377792
|View full text |Cite
|
Sign up to set email alerts
|

Heuristic metamorphic malware detection based on statistics of assembly instructions using classification algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 10 publications
0
27
0
1
Order By: Relevance
“…Among reviewed works, the majority relies on dynamic analyses [42,55,56,15,44,16,60,57,66,46,50,58,24,26,28,30,51,52,53,35,40], while the others use, in equal proportions, either static analyses alone [11,12,63,64,72,17,65,19,47,49,61,22,23,25,31,73,27,29,37,38,54,67,74,39] or a combination of static and dynamic techniques [75,18,21,48,20,…”
Section: Feature Extractionmentioning
confidence: 99%
“…Among reviewed works, the majority relies on dynamic analyses [42,55,56,15,44,16,60,57,66,46,50,58,24,26,28,30,51,52,53,35,40], while the others use, in equal proportions, either static analyses alone [11,12,63,64,72,17,65,19,47,49,61,22,23,25,31,73,27,29,37,38,54,67,74,39] or a combination of static and dynamic techniques [75,18,21,48,20,…”
Section: Feature Extractionmentioning
confidence: 99%
“…Histograms are created using features same as that of API Call and then used to classify files as either malicious or benign. Khodamoradi et al (2015) used a decision tree to compute statistics about Opcode and build thresholds. They used a tool called Opcode Statistic Extractor (OSE) to analyse disassembled code and calculate Opcode frequency.…”
Section: Conclusion and Further Discussionmentioning
confidence: 99%
“…Several online automated tools exist for dynamic analysis of malware, e.g. Norman Sandbox [19], CWSandbox [20], Anubis [21] and TTAnalyzer [22], Ether [23] and ThreatExpert [24]. The analysis reports generated by these tools give in-depth understanding of the malware behavior and valuable insight into the actions performed by them.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…Many studies use static analysis for malware detection using exact decompilation [16], similarity testing framework [17], based on register contents [18], using two-dimensional binary program features [19], subroutine based detection [20], statistics of assembly instructions [21], file relation graphs [22], de-anonymizing programmers via code stylometry [23], based upon a wavelet package technique [24], analysis and comparison of disassemblers for opcode [25].…”
mentioning
confidence: 99%