2008 3rd International Conference on Malicious and Unwanted Software (MALWARE) 2008
DOI: 10.1109/malware.2008.4690851
|View full text |Cite
|
Sign up to set email alerts
|

Morphological detection of malware

Abstract: In the field of malware detection, method based on syntactical consideration are usually efficient. However, they are strongly vulnerable to obfuscation techniques. This study proposes an efficient construction of a morphological malware detector based on a syntactic and a semantic analysis, technically on control flow graphs of programs (CFG). Our construction employs tree automata techniques to provide an efficient representation of the CFG database. Next, we deal with classic obfuscation of programs by muta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…It can be used in various contexts such as virus detection [4] or libraries identification [3].In the present paper, we describe how morphological analysis can be used to resynchronize addresses in binary codes. We provide here only the main steps of morphological analysis.…”
Section: Morphological Analysismentioning
confidence: 99%
“…It can be used in various contexts such as virus detection [4] or libraries identification [3].In the present paper, we describe how morphological analysis can be used to resynchronize addresses in binary codes. We provide here only the main steps of morphological analysis.…”
Section: Morphological Analysismentioning
confidence: 99%
“…CFGs have been often successfully used in static analysis [13,5]. However, given the complexity of certain pages, CFGs can be computationally expensive to generate, and hard to navigate.…”
Section: The Calculatormentioning
confidence: 99%
“…We borrowed the idea of using control flow analysis from some recent interesting work [9,21,5,6]. The Swaddler system [9], for example, focuses on detecting any violations in the workflow of a stateful application or input violations by users.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In one month amid 2007, 79% of recognized malware was packed [7]. Also, very nearly half of new malware in 2006 were repacked forms of existing malware [7] [8].This article has been acknowledged for distribution in a future issue of this diary, yet has not been completely altered. Substance may change preceding last distribution.…”
Section: Introductionmentioning
confidence: 99%