2012 Third Cybercrime and Trustworthy Computing Workshop 2012
DOI: 10.1109/ctc.2012.15
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Code Detection Using Penalized Splines on OPcode Frequency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…In another related work, opcode sequences are converted into RGB pixels in an image matrix and the similarity of image matrices is computed [49]. Our approach is different in two ways based on enhancements with previous work [18,19]. Firstly, we make use of a huge dataset of about 52,000 malware samples for our study while the previous work experiments with only 290 malware samples with 16 families.…”
Section: Proposed Methods Using Similarity Miningmentioning
confidence: 99%
See 2 more Smart Citations
“…In another related work, opcode sequences are converted into RGB pixels in an image matrix and the similarity of image matrices is computed [49]. Our approach is different in two ways based on enhancements with previous work [18,19]. Firstly, we make use of a huge dataset of about 52,000 malware samples for our study while the previous work experiments with only 290 malware samples with 16 families.…”
Section: Proposed Methods Using Similarity Miningmentioning
confidence: 99%
“…Similarity based detection is well-suited for static metamorphic and polymorphic malware analysis since new malware programs are generated as variants of existing ones to achieve zeroday attacks. In previous research studies, API calls have been analysed as well as how they could be used to profile malware [18][19][20]. In this study, we enhance the recent research work [50] in terms of addition of visualisation features.…”
Section: Cosine Distance the Cosine Distance Computed Between Two N-mentioning
confidence: 99%
See 1 more Smart Citation
“…Because we acquired statistical data through static analysis for the detection and classification of malware, this information was used as features in machine learning. Many features extracted by static methods, such as byte sequence [31], strings [31,43], DLL [31], n-gram [35], grayscale images [38], control flow graph (CFG) [39], function length frequency [40], PE header [41,42], mnemonics [49,50], API call [51][52][53][54], and opcode [8,[44][45][46][47], have typically been leveraged to detect and classify malware using machine learning. We select opcode as a core feature to distinguish malware from benign samples during execution.…”
Section: Machine Learning-based Analysismentioning
confidence: 99%
“…A recent exposition by VERIZON [8] stated that '· · · if you know how malware gets on systems and what it tends to do, you're in a good position to make informed decisions about protecting the enterprise. Hence, However, presently computer crimes is recorded as growing exponentially globally [9]. Malware investigators still adopt a manual approach in tackling this crimes, which is time consuming and sometimes inconclusive [10].…”
Section: Introductionmentioning
confidence: 99%