2013
DOI: 10.1007/s11416-013-0184-5
|View full text |Cite
|
Sign up to set email alerts
|

Simple substitution distance and metamorphic detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

2
25
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 55 publications
(27 citation statements)
references
References 16 publications
2
25
0
Order By: Relevance
“…However, these techniques require separate environment to analyze malware in order to be able to be detected. At the same time, the requirement of binary code disassembly in opcode-based methods [3][4][5] is not suitable for timely metamorphic detection on host-level intrusion detection systems.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, these techniques require separate environment to analyze malware in order to be able to be detected. At the same time, the requirement of binary code disassembly in opcode-based methods [3][4][5] is not suitable for timely metamorphic detection on host-level intrusion detection systems.…”
Section: Introductionmentioning
confidence: 99%
“…However, these techniques require separate environment to analyze malware in order to be able to be detected. At the same time, the requirement of binary code disassembly in opcode-based methods [3][4][5] is not suitable for timely metamorphic detection on host-level intrusion detection systems.We propose metamorphic malware detection based on static analysis of metamorphic malware binaries without disassembly. Features are extracted from binary, which can be in the form of packets payload in network detection system or files in host based detection system using n-gram feature extraction and machine learning SVM classification.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…In Jakobsen's algorithm, the score gives the degree to which the putative plaintext matches the plaintext language statistics. The score given by Simple Substitution Distance method can be viewed as a measure of the distance between the opcode sequence of a given file and the opcode statistics of a metamorphic family [23].…”
Section: Simple Substitution Distancementioning
confidence: 99%
“…The techniques we analyze in this paper were inspired by previous research on metamorphic virus detection [13,16,26,27,44]. Metamorphic malware changes its internal structure at each infection, while maintaining its essential function.…”
mentioning
confidence: 99%