2012 7th International Conference on Malicious and Unwanted Software 2012
DOI: 10.1109/malware.2012.6461006
|View full text |Cite
|
Sign up to set email alerts
|

Malware Analysis and attribution using Genetic Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…Moreover, we plan to investigate also the field of semantic features. Works like Reference [22] show how it is possible to use semantic features to determining malware similarity and the temporal ordering of malware, generating also malware lineages. We believe that these information can heavily help to detect and identifying malware developed by APTs, with the addition of highlighting the evolution of the tools used by attackers to perform their activities.…”
Section: Execution Timementioning
confidence: 99%
“…Moreover, we plan to investigate also the field of semantic features. Works like Reference [22] show how it is possible to use semantic features to determining malware similarity and the temporal ordering of malware, generating also malware lineages. We believe that these information can heavily help to detect and identifying malware developed by APTs, with the addition of highlighting the evolution of the tools used by attackers to perform their activities.…”
Section: Execution Timementioning
confidence: 99%
“…The work of Pfeffer et al [ 6 ] examines information obtained via both static and dynamic analysis of malware samples in order to organize code samples into lineages indicative of the order in which samples were derived from each other.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Because we acquired statistical data through static analysis for the detection and classification of malware, this information was used as features in machine learning. Many features extracted by static methods, such as byte sequence [31], strings [31,43], DLL [31], n-gram [35], grayscale images [38], control flow graph (CFG) [39], function length frequency [40], PE header [41,42], mnemonics [49,50], API call [51][52][53][54], and opcode [8,[44][45][46][47], have typically been leveraged to detect and classify malware using machine learning. We select opcode as a core feature to distinguish malware from benign samples during execution.…”
Section: Machine Learning-based Analysismentioning
confidence: 99%