The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1007/978-3-319-26362-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Inference on Integrity for Access Behavior Based Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(19 citation statements)
references
References 18 publications
0
19
0
Order By: Relevance
“…The information extraction process is performed through either static or dy- [42,56,68,15,16,60,57,58,69,51,52,33] or emulators [70,40]. Also program analysis tools and techniques can be useful in the feature extraction process by providing, for example, disassembly code and control-and data-flow graphs.…”
Section: Feature Extractionmentioning
confidence: 99%
“…The information extraction process is performed through either static or dy- [42,56,68,15,16,60,57,58,69,51,52,33] or emulators [70,40]. Also program analysis tools and techniques can be useful in the feature extraction process by providing, for example, disassembly code and control-and data-flow graphs.…”
Section: Feature Extractionmentioning
confidence: 99%
“…Different malware detection approaches in the literature have adopted different machine-learning techniques, such as random forest (RF) [5][6][7], neural network [9][10][11], decision tree [12,13], naïve Bayes [14,15], KNN and SVM [15], ARIMA [16], and reinforcement learning [17,18].…”
Section: Related Workmentioning
confidence: 99%
“…This work extends a previously explored approach called RBCM, which is also based on reinforcement learning [3]. The RBCM extension is called eRBCM, and merges the most beneficial features of Monte-Carlo-based real-time learning (MOCART) [4] and random forest [5][6][7] to make it more scalable for higher-order training datasets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The studies that use dynamic analysis perform synthesis the semantics of obfuscated code [7], multi-hypothesis testing [26], analyzing quantitative data flow graph metrics [27], using simplified data-dependent api call graph [28], downloader graph analytics [29], access behavior [30,31], APIs in initial behavior [32], log-based crowdsourcing analysis [33].…”
mentioning
confidence: 99%