Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis 2004
DOI: 10.1145/1007512.1007518
|View full text |Cite
|
Sign up to set email alerts
|

Testing malware detectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
113
0
13

Year Published

2005
2005
2015
2015

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 171 publications
(126 citation statements)
references
References 16 publications
0
113
0
13
Order By: Relevance
“…Recall cost function (8) that is used during the sequence comparison step where and are adjustable parameters in order to assign appropriate weights to our two components. In all our experiments, we chose = 1.6 and = 0.4.…”
Section: Cost Constantsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recall cost function (8) that is used during the sequence comparison step where and are adjustable parameters in order to assign appropriate weights to our two components. In all our experiments, we chose = 1.6 and = 0.4.…”
Section: Cost Constantsmentioning
confidence: 99%
“…This feature makes them very difficult to detect since the obfuscation used by metamorphic engines can allow them to defeat traditional malware detectors based on pattern matching [8,35].…”
Section: Introductionmentioning
confidence: 99%
“…The Malware attack mechanism can be identified either on the OSI Application layer with Antivirus software, or in the OSI Network layer by IDS software [31]. Malware can be identified directly and the accuracy of the identification is high with a low false positive rate.…”
Section: Attack Mechanism Determinationmentioning
confidence: 99%
“…False positive is when a classifier classifies some item as harmful incorrectly [32]. Malware that is not detectable is also a concern [31]. False negative refers to malware that is not detected.…”
Section: Attack Mechanism Determinationmentioning
confidence: 99%
“…An example is the MetaPHOR system (c.f., [10]), which has become the basis for many other metamorphic malware propagation systems. Reversing these obfuscations to obtain reliable feature sets for signature-based detection is the subject of much current research [9,11,12], but case studies have shown that current antivirus detection schemes remain vulnerable to simple obfuscation attacks until the detector's signature database is updated to respond to the threat [13].…”
Section: Related Workmentioning
confidence: 99%