2018 13th International Conference on Malicious and Unwanted Software (MALWARE) 2018
DOI: 10.1109/malware.2018.8659366
|View full text |Cite
|
Sign up to set email alerts
|

Malware Anomaly Detection on Virtual Assistants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…System call sequences have been shown to be effective as a feature set in many architectures due to the fact that they are one of the best indicators of what is happening on a machine at runtime [10] [2]. Each process running on a machine uses system calls to request resources from the OS kernel, which means the programs running normally are likely to make similar system calls each time they run.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…System call sequences have been shown to be effective as a feature set in many architectures due to the fact that they are one of the best indicators of what is happening on a machine at runtime [10] [2]. Each process running on a machine uses system calls to request resources from the OS kernel, which means the programs running normally are likely to make similar system calls each time they run.…”
Section: Related Workmentioning
confidence: 99%
“…The pre-processing step for system calls is similar to [2], where a sequence of system calls collected in a window size of length L is treated as an observation. Then, a bag-of-n-grams approach [4], [1], [11] is used to group the system calls and create the feature vector x ∈ R p .…”
Section: System Callsmentioning
confidence: 99%