메뉴 건너뛰기




Volumn 1, Issue 1-2, 2005, Pages 13-23

Malware phylogeny generation using permutations of code

Author keywords

Evolution; Malware; n grams; n perms; Naming; Permutation; Phylogeny; Virus; Worm

Indexed keywords


EID: 33746882464     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-005-0002-9     Document Type: Article
Times cited : (189)

References (29)
  • 2
    • 2342498943 scopus 로고    scopus 로고
    • Technical and human issues in computerbased systems security
    • School of Computing Science, University of Newcastle-upon-Tyme
    • Arief B, Besnard D (2003) Technical and human issues in computerbased systems security. Tech. Rep. CS-TR-790, School of Computing Science, University of Newcastle-upon-Tyme
    • (2003) Tech. Rep. , vol.CS-TR-790
    • Arief, B.1    Besnard, D.2
  • 4
    • 0039528117 scopus 로고
    • A program for identifying duplicated code
    • Baker BS (1992) A program for identifying duplicated code. Comput Sci Stat 24:49-57
    • (1992) Comput Sci Stat , vol.24 , pp. 49-57
    • Baker, B.S.1
  • 8
    • 33746903440 scopus 로고    scopus 로고
    • Anti-virus spamming and the virus-naming mess: Part 2
    • Bontchev V (2004) Anti-virus spamming and the virus-naming mess: Part 2. Virus Bull pp 13-15
    • (2004) Virus Bull , pp. 13-15
    • Bontchev, V.1
  • 13
    • 33746877417 scopus 로고    scopus 로고
    • Dealing with metamorphism
    • Jordan M (2002) Dealing with metamorphism. Virus Bulletin pp 4-6
    • (2002) Virus Bulletin , pp. 4-6
    • Jordan, M.1
  • 14
    • 0038163983 scopus 로고    scopus 로고
    • CLUTO: A clustering toolkit, release 2.1.1
    • Department of Computer Science, University of Minnesota, Minneapolis, MN 55455, November 2003
    • Karypis G (2003) CLUTO: A clustering toolkit, release 2.1.1, Tech. Rep. #02-017, Department of Computer Science, University of Minnesota, Minneapolis, MN 55455, November 2003
    • (2003) Tech. Rep. #02-017 , vol.2 , Issue.17
    • Karypis, G.1
  • 25
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • Tesauro G, Kephart JO, Sorkin GB (1996) Neural networks for computer virus recognition. IEEE Expert 11(4):5-6
    • (1996) IEEE Expert , vol.11 , Issue.4 , pp. 5-6
    • Tesauro, G.1    Kephart, J.O.2    Sorkin, G.B.3
  • 26
    • 84976728067 scopus 로고
    • The string-to-string correction problem with block moves
    • Tichy WF (1984) The string-to-string correction problem with block moves. ACM Trans Comput Syst 2(4):309-321
    • (1984) ACM Trans Comput Syst , vol.2 , Issue.4 , pp. 309-321
    • Tichy, W.F.1
  • 27
    • 33746898520 scopus 로고    scopus 로고
    • VX heavens (2005) Available from vx.netlux.org (and mirrors), Last retrieved 5 March
    • VX heavens (2005) Available from vx.netlux.org (and mirrors), Last retrieved 5 March
  • 29
    • 0002848777 scopus 로고    scopus 로고
    • Exploring the similarity space
    • Zobel J, Moffat A (1998) Exploring the similarity space. SIGIR Forum 32(1):18-34
    • (1998) SIGIR Forum , vol.32 , Issue.1 , pp. 18-34
    • Zobel, J.1    Moffat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.