Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3230840
|View full text |Cite
|
Sign up to set email alerts
|

Learning Malware Using Generalized Graph Kernels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…POMMADE [13,14] is a malware detector based on LTL and CTL model-checking of pushdown systems. STAMAD [24][25][26] is a malware detector based on PDSs and machine learning. However, all these tools cannot handle self-modifying code.…”
Section: Related Workmentioning
confidence: 99%
“…POMMADE [13,14] is a malware detector based on LTL and CTL model-checking of pushdown systems. STAMAD [24][25][26] is a malware detector based on PDSs and machine learning. However, all these tools cannot handle self-modifying code.…”
Section: Related Workmentioning
confidence: 99%
“…POMMADE [3,4] is a malware detector based on LTL and CTL modelchecking of PDSs. STAMAD [15,16,14] is a malware detector based on PDSs and machine learning. However, POMMADE and STAMAD cannot deal with self-modifying code.…”
Section: Related Work Model Checking and Static Analysis Approaches H...mentioning
confidence: 99%
“…In STAMAD, we use a variant of the random walk graph kernel that measures graph similarity as the number of common paths of increasing lengths [21]. More details about our learning approach can be found in [10,13].…”
Section: Learning Malicious Behaviorsmentioning
confidence: 99%