2016
DOI: 10.1080/10798587.2015.1118916
|View full text |Cite
|
Sign up to set email alerts
|

Malware Analysis and Classification Using Sequence Alignments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 10 publications
0
8
0
1
Order By: Relevance
“…They executed malware programs to compute distance using the LSH technique, which calculates a probabilistic estimate of all near pairs. Cho et al [11] proposed a malware similarity method with malware executing.…”
Section: ⅱ Malware Classificationmentioning
confidence: 99%
“…They executed malware programs to compute distance using the LSH technique, which calculates a probabilistic estimate of all near pairs. Cho et al [11] proposed a malware similarity method with malware executing.…”
Section: ⅱ Malware Classificationmentioning
confidence: 99%
“…Cho, et al [1] devised a malware similarity calculation system to detect malware variants and suggested the process which can reduce sequence alignment overheads. They removed the repeated API subsequences in the whole API call sequence due to the fact that such a process makes no loss in the overall accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Generally dynamic analysis has two ways according to the used feature and applied technique. Firstly, dynamic analysis by the used features utilizes information such as the frequency or sequence of API call [1], [3]- [5], compiled hexadecimal code [2], program execution paths [8] and others [5]- [7] as the feature. Secondly, analysis by applied techniques utilizes a sequence alignment [1], [2] and data mining or machine learning [2]- [5], [9] for the collected feature data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Chamadas de APIs fornecem informações importantes sobre o comportamento de um software, e outros trabalhos já as utilizaram para realizar análise de malware (AHMADI et al, 2016), (CHO et al, 2014). Malwares normalmente utilizam as APIs SetWindowsHookEx, GetForegroundWindow e GetAsyncKeyState para capturar dados digitados pelo alvo (SIKORSKI; HONIG, 2012), técnica conhecida como keylogging.…”
Section: Chamadas De Apisunclassified