Proceedings of the 1st India Software Engineering Conference 2008
DOI: 10.1145/1342211.1342215
|View full text |Cite
|
Sign up to set email alerts
|

Mining specifications of malicious behavior

Abstract: Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic technique to overcome this laborious manual process. Our technique derives such a specification by comparing the execution behavior of a known malware against the execution behaviors of a set of benign programs. In other words, we mine the malicious behavior present in a known malware that is not present in a set of benign programs. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
122
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 132 publications
(124 citation statements)
references
References 26 publications
2
122
0
Order By: Relevance
“…We acquired the malicious files from the VX Heaven website [17]. The files in the benign set, including executable and DLL (Dynamic Linked Library) files, were gathered from machines running Windows XP operating system in our campus.…”
Section: Discussionmentioning
confidence: 99%
“…We acquired the malicious files from the VX Heaven website [17]. The files in the benign set, including executable and DLL (Dynamic Linked Library) files, were gathered from machines running Windows XP operating system in our campus.…”
Section: Discussionmentioning
confidence: 99%
“…The reasons of growing web based malware in web world are to increase cyber crimes. The real world applications mostly effected from malware are banking, electronics communication and online shopping etc [1].…”
Section: Introductionmentioning
confidence: 99%
“…The reason for not being able to achieve a 100% detection and / or prevention of malware is because malware authors make use of sophisticated hiding techniques in order to prevent malware from being detected by means of signature based techniques. Such techniques are either entirely or partially based on code obfuscation [5][2] [6]. This has resulted in the emergence of malware known as polymorphic and metamorphic malware.…”
Section: Introductionmentioning
confidence: 99%