2017
DOI: 10.1177/1548512917721755
|View full text |Cite
|
Sign up to set email alerts
|

Malware modeling and experimentation through parameterized behavior

Abstract: Experimentation is critical to understanding the malware operation and to evaluating potential defenses. However, constructing the controlled environments needed for this experimentation is both time-consuming and error-prone. In this study, we highlight several common mistakes made by researchers and conclude that existing evaluations of malware detection techniques often lack in both flexibility and transparency. For instance, we show that small variations in the malware’s behavioral parameters can have a si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
(34 reference statements)
0
1
0
Order By: Relevance
“…Feature cultivation in these detection systems has been a key effort within the security communities. For example, researchers have previously used specific patterns to group malware samples into families [23], [30], have explored using DNS information to understand and predict botnet domains [20], [31], [32], and have analyzed system and network level features to identify malware traffic [33]- [35]. Other works have focused on user authentication using the facial images [36], [37].…”
Section: Related Workmentioning
confidence: 99%
“…Feature cultivation in these detection systems has been a key effort within the security communities. For example, researchers have previously used specific patterns to group malware samples into families [23], [30], have explored using DNS information to understand and predict botnet domains [20], [31], [32], and have analyzed system and network level features to identify malware traffic [33]- [35]. Other works have focused on user authentication using the facial images [36], [37].…”
Section: Related Workmentioning
confidence: 99%