2014
DOI: 10.1214/13-aoas703
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic identification of malware with dynamic traces

Abstract: A novel approach to malware classification is introduced based on analysis of instruction traces that are collected dynamically from the program in question. The method has been implemented online in a sandbox environment (i.e., a security mechanism for separating running programs) at Los Alamos National Laboratory, and is intended for eventual host-based use, provided the issue of sampling the instructions executed by a given process without disruption to the user can be satisfactorily addressed. The procedur… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 35 publications
(34 reference statements)
0
22
0
Order By: Relevance
“…Given Similarity > X FIGURE 4 The empirical probability that a pair of samples belong to the same family given that their global static trace similarity exceeds X.…”
Section: Same Family Probabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Given Similarity > X FIGURE 4 The empirical probability that a pair of samples belong to the same family given that their global static trace similarity exceeds X.…”
Section: Same Family Probabilitymentioning
confidence: 99%
“…However, ref. [4] points out that the static trace of a program is not always available because it can be obscured if the program uses an unknown packer. If a program's static trace is available, it is possible to group the instructions into subroutines using an interactive disassembler, such as IDA Pro [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Assembly instructions have had a lot of exposure in the literature [1,4,19,23]. This is a fundamental view of subroutines, and we make use of it in this work.…”
Section: Instructionsmentioning
confidence: 99%
“…Here, we evaluate the relative performance of five regularized linear regression models for prediction. The methods comprise the Least absolute shrinkage and selection operator (Lasso) [4][5], Ridge regression (RR) [5][6][7], Elastic net [5,[8][9][10],Relaxed lasso [11][12],Least Angle Regression(LARS) [13][14]. The claim and arrival of regularization models in various application fields, containing descriptor selection, associated to their use of penalties that eases fitting models with variables that run towards thousands, including many irrelevant to the response, far exceed the sample size, or are highly correlated, with high efficiency and prediction accuracy.…”
Section: Introductionmentioning
confidence: 99%