메뉴 건너뛰기




Volumn , Issue , 2008, Pages 358-363

Data mining methods for malware detection using instruction sequences

Author keywords

Binary classification; Data mining; Disassembly; Instruction sequences; Malware detection; Static analysis

Indexed keywords

BINARY CLASSIFICATION; BINARY CLASSIFICATION PROBLEMS; BUILDING PROCESS; COMPUTER SECURITIES; DATA MINING METHODS; DATA MINING TECHNIQUES; DECISION TREE MODELS; DISASSEMBLY; INSTRUCTION SEQUENCES; LOGISTIC REGRESSIONS; MALICIOUS BEHAVIORS; MALWARE DETECTION;

EID: 62849117735     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (20)
  • 2
    • 84869255587 scopus 로고    scopus 로고
    • PEiD. http://peid.has.it/.
    • PEiD
  • 3
    • 84869245143 scopus 로고    scopus 로고
    • VMware. http://www.vmware.com/.
    • VMware
  • 5
    • 18844362133 scopus 로고    scopus 로고
    • T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan. N-gram-based detection of new malicious code. In Proceedings of the 28th Annual International Computer Software and Applications Conference, Workshops and Fast Abstracts, COMPSAC'04, 02, pages 41-42, 2004
    • T. Abou-Assaleh, N. Cercone, V. Keselj, and R. Sweidan. N-gram-based detection of new malicious code. In Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - (COMPSAC'04) - Volume 02, pages 41-42, 2004.
  • 6
    • 3943082567 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry accesses
    • Technical report
    • F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses. Technical report, 2001.
    • (2001)
    • Apap, F.1    Honig, A.2    Hershkop, S.3    Eskin, E.4    Stolfo, S.5
  • 7
    • 2342473490 scopus 로고    scopus 로고
    • Automatically generated win32 heuristic virus detection
    • W. Arnold and G. Tesauro. Automatically generated win32 heuristic virus detection. In Virus Bulletin Conference, pages 123-132, 2000.
    • (2000) Virus Bulletin Conference , pp. 123-132
    • Arnold, W.1    Tesauro, G.2
  • 10
    • 0004246220 scopus 로고
    • PhD thesis, University of Southern California
    • F. Cohen. Computer Viruses. PhD thesis, University of Southern California, 1985.
    • (1985) Computer Viruses
    • Cohen, F.1
  • 13
    • 34247098898 scopus 로고    scopus 로고
    • Detecting unknown computer viruses - a new approach -
    • A. Mori. Detecting unknown computer viruses - a new approach -. Lecture Notes in Computer Science, pages 226-241, 2004.
    • (2004) Lecture Notes in Computer Science , pp. 226-241
    • Mori, A.1
  • 17
    • 0011544663 scopus 로고    scopus 로고
    • Understanding heuristics: Symantec's bloodhound technology
    • Technical report, Symantec Corporation
    • Symantec. Understanding heuristics: Symantec's bloodhound technology. Technical report, Symantec Corporation, 1997.
    • (1997)
    • Symantec1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.