Proceedings of the 2012 ACM Research in Applied Computation Symposium 2012
DOI: 10.1145/2401603.2401672
|View full text |Cite
|
Sign up to set email alerts
|

Malware classification method via binary content comparison

Abstract: With the wide spread uses of the Internet, the number of Internet attacks keeps increasing, and malware is the main cause of most Internet attacks. Malware is used by attackers to infect normal users' computers and to acquire private information as well as to attack other machines. The number of new malware and variants of malware is increasing every year because the automated tools allow attackers to generate the new malware or their variants easily. Therefore, performance improvement of the malware analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Several themes to mechanize malware classification are actively researched and pertinent. One theme is the advancements of automated systems for static and dynamic detection, including an emphasis on model-based classification [22,21,15]. Nonetheless a strong need for expert human evaluation remains [20], thereby indicating the importance of retaining the human in the loop.…”
Section: Malware Classificationmentioning
confidence: 99%
“…Several themes to mechanize malware classification are actively researched and pertinent. One theme is the advancements of automated systems for static and dynamic detection, including an emphasis on model-based classification [22,21,15]. Nonetheless a strong need for expert human evaluation remains [20], thereby indicating the importance of retaining the human in the loop.…”
Section: Malware Classificationmentioning
confidence: 99%
“…The issue was solved by reducing operation cost and converting to a type that is appropriate for using with clustering and classification logic. That is, dimensions are reduced by converting the 2-gram value to 1,204th fixed length vector values using the feature-hashing function before calculating similarity and classifying groups [5].…”
Section: Malware Group Classification Modulementioning
confidence: 99%
“…Malware signature detection is employed by the tradition anti-virus systems but it is easy to be evaded. Some researches analyzed the malware binary codes by static analysis [5] [6] [7] [8] [9]. They extracted the API names and strings from malicious PE executables and then analyzed these information with algorithms in order to find out the differences between malicious and benign programs.…”
Section: Host Based Detectionmentioning
confidence: 99%