2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 2018
DOI: 10.1109/compsac.2018.00036
|View full text |Cite
|
Sign up to set email alerts
|

Precise Extraction of Malicious Behaviors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…STAMAD implements the techniques described in [11,12]: Given a set of extended API call graphs that correspond to malwares and a set of extended API call graphs corresponding to benign programs, we want to extract in a completely automatic way a malicious extended API graph that corresponds to the malicious behaviors of the malwares. This malicious extended API graph should represent the parts of the extended API call graphs of the malwares that correspond to the malicious behaviors.…”
Section: Extraction Of Malicious Behaviorsmentioning
confidence: 99%
See 4 more Smart Citations
“…STAMAD implements the techniques described in [11,12]: Given a set of extended API call graphs that correspond to malwares and a set of extended API call graphs corresponding to benign programs, we want to extract in a completely automatic way a malicious extended API graph that corresponds to the malicious behaviors of the malwares. This malicious extended API graph should represent the parts of the extended API call graphs of the malwares that correspond to the malicious behaviors.…”
Section: Extraction Of Malicious Behaviorsmentioning
confidence: 99%
“…One of the most popular techniques that was shown to be very efficient in the IR community is the TFIDF scheme that computes the relevance of each item in the collection using the TFIDF weight that is computed from the occurrences of terms in a document and their appearances in other documents. We showed in [11,12] how to adapt this technique that was mainly applied for text and image retrieval for malicious extended API graph extraction. For that, we associate to each node and each edge in the extended API call graphs of the programs of the collection a weight.…”
Section: Extraction Of Malicious Behaviorsmentioning
confidence: 99%
See 3 more Smart Citations