2014
DOI: 10.1007/978-3-319-05149-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Methodical Evaluation of Antivirus Scans and Labels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
16
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 10 publications
2
16
0
Order By: Relevance
“…Consistent with the results of [12] on a smaller and less representative set of files, our results support the conclusion that the five malware-identification methods are looking for different kinds of things. Note that the hypothesis that some malware methods include files that merely contain vulnerabilities rather than exploits is not supported by the data in the BV (Bit9 vulnerability) column, since there was very little overlap between Bit9's vulnerable set and the malicious hash sets.…”
Section: Obtaining Malware For Testingsupporting
confidence: 89%
“…Consistent with the results of [12] on a smaller and less representative set of files, our results support the conclusion that the five malware-identification methods are looking for different kinds of things. Note that the hypothesis that some malware methods include files that merely contain vulnerabilities rather than exploits is not supported by the data in the BV (Bit9 vulnerability) column, since there was very little overlap between Bit9's vulnerable set and the malicious hash sets.…”
Section: Obtaining Malware For Testingsupporting
confidence: 89%
“…The count used was the number of distinct malware hash values associated with the clue, since we saw drives where the same malware hash value occurred in hundreds of files it had infected. The five malware identification methods clearly seem to be addressing different kinds of files, consistent with the results of [11] on a larger number of malware detection methods but fewer files. Taking as valid those clues occurring more than two standard deviations in the same direction on at least three of the five methods, the positive clues were files whose size had a natural logarithm of more than 15, files at the top level of the directory hierarchy, deleted files (not helpful because many were deleted by anti-malware software), files where the file extension category was incompatible with its type based on its header and other "magic numbers", files created at odd creation times for their directory, files with singleoccurrence hash values, files with unusual characters in their paths, executables, files related to hardware, temporary files, and files not in major categories.…”
Section: Testing Malware Cluessupporting
confidence: 77%
“…Thus it is valuable to have more specific criteria for when a file is worth checking. Although there has been much work on malware detection [3,9,11], it is almost entirely focused on analysis of file and packet contents, and methods that examine the smaller amount of metadata and hashes could be a useful first step.…”
Section: Finding Uninteresting Files In Malware Investigationsmentioning
confidence: 99%
“…The signature based detection is a widely used method in static analysis. According to this method, the binary executables are transformed to represent hashes which are matched with a database of known malware samples [ 13] [ 14] [15] [ 16] [ 17], but it shows following weaknesses. The signature method requires continuous updates of signature and high maintenance cost.…”
Section: Introductionmentioning
confidence: 99%