Proceedings of the 2010 ACM Symposium on Applied Computing 2010
DOI: 10.1145/1774088.1774303
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection based on mining API calls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0
2

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 134 publications
(71 citation statements)
references
References 10 publications
0
69
0
2
Order By: Relevance
“…The level of the access to user's data depends on vulnerability level or category [14]. Whole dataset is divided into three categories which are: I.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The level of the access to user's data depends on vulnerability level or category [14]. Whole dataset is divided into three categories which are: I.…”
Section: Resultsmentioning
confidence: 99%
“…But API usability will automatically improve if security issues can be resolved. Some paper propose new security layer for a specific device only but they didn't talk about API design policy [3], [10], [14]. Any security issues network, computers, servers or databases are responsible for representing security risks that can be exploited by hackers to gain access to system information [4].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The classification method of malware by Sami et al [14] extracts only the frequent API sequences from a large number of APIs used in their evaluation. These APIs are divided into the function categories defined by Microsoft Developer Network [12], thereby, feature vector is reduced from 44,605 to 95 dimensions.…”
Section: Classification Methods Of Malwarementioning
confidence: 99%
“…Furthermore, in order to improve the classification accuracy of malware, they have chosen 4 dimensions by high Fisher score. However, the unpacking method in this method [14] cannot deal with handmade packers and the extracted APIs are numerous, so this method is unpractical.…”
Section: Classification Methods Of Malwarementioning
confidence: 99%
See 1 more Smart Citation