메뉴 건너뛰기




Volumn , Issue , 2009, Pages 611-620

Large-scale malware indexing using function-call graphs

Author keywords

Graph similarity; Malware indexing; Multi resolution indexing

Indexed keywords

ANTI VIRUS; CALL GRAPHS; COMPREHENSIVE PERFORMANCE; DATA-BASE MANAGEMENT SYSTEMS; EARLY PRUNING; EFFICIENT METHOD; FEATURE VECTORS; GRAPH DATABASE; GRAPH SIMILARITY; INDEXING SCHEME; INSTRUCTION-LEVEL; MALWARES; MULTI-RESOLUTIONS; NEAREST NEIGHBOR SEARCH; POSSIBLE SOLUTIONS; SPEED-UPS; STRUCTURAL REPRESENTATION; SYMANTEC;

EID: 74049142314     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653736     Document Type: Conference Paper
Times cited : (281)

References (39)
  • 1
    • 74049126777 scopus 로고    scopus 로고
    • Armadillo. http://www.siliconrealms.com/armadillo.htm, 2008.
    • (2008) Armadillo
  • 2
    • 74049113076 scopus 로고    scopus 로고
    • Peid 0.95. http://www.peid.info/, 2008.
    • (2008) Peid 0.95
  • 3
    • 74049128481 scopus 로고    scopus 로고
    • Trid v2.02. http://mark0.net/soft-trid-e.html, 2008.
    • (2008) Trid v2.02
  • 6
    • 0031162001 scopus 로고    scopus 로고
    • T. Bozkaya and M. Ozsoyoglu. Distance-based indexing for high-dimensional metric spaces. In In Proc. ACM SIGMOD International Conference on Management of Data, 1997.
    • T. Bozkaya and M. Ozsoyoglu. Distance-based indexing for high-dimensional metric spaces. In In Proc. ACM SIGMOD International Conference on Management of Data, 1997.
  • 7
    • 74049107976 scopus 로고    scopus 로고
    • I. Briones and A. Gomez. Graphs, entropy and grid computing: Automatic comparison of malware. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
    • I. Briones and A. Gomez. Graphs, entropy and grid computing: Automatic comparison of malware. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
  • 8
    • 74049098102 scopus 로고    scopus 로고
    • E. Carrera and G. Erdelyi. Digital genome mapping a̧ł advanced binary malware analysis. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
    • E. Carrera and G. Erdelyi. Digital genome mapping a̧ł advanced binary malware analysis. In Proceedings of the 2004 Virus Bulletin Conference, 2004.
  • 10
    • 74049134163 scopus 로고    scopus 로고
    • A graph matching problem
    • IPAM Research in Industrial Projects for Students RIPS
    • S. Das, A. Mistry, D. Negoescu, G. Reed, and S. K. Singh. A graph matching problem. Techical report, IPAM Research in Industrial Projects for Students (RIPS), 2008.
    • (2008) Techical report
    • Das, S.1    Mistry, A.2    Negoescu, D.3    Reed, G.4    Singh, S.K.5
  • 12
    • 56549090955 scopus 로고    scopus 로고
    • A study of the packer problem and its solutions
    • F. Guo, P. Ferrie, and T.-C. Chiueh. A study of the packer problem and its solutions. In RAID '08, pages 98-115, 2008.
    • (2008) RAID '08 , pp. 98-115
    • Guo, F.1    Ferrie, P.2    Chiueh, T.-C.3
  • 13
    • 52349096066 scopus 로고    scopus 로고
    • Practical analysis of stripped binary code
    • L. C. Harris and B. P. Miller. Practical analysis of stripped binary code. SIGARCH Comput. Archit. News, 33(5):63-68, 2005.
    • (2005) SIGARCH Comput. Archit. News , vol.33 , Issue.5 , pp. 63-68
    • Harris, L.C.1    Miller, B.P.2
  • 16
    • 74049105789 scopus 로고    scopus 로고
    • Large-scale malware indexing using function-call graphs (extended)
    • Technical Report, Department of Computer Sicence, University of Michigan
    • X. Hu, T. cker Chiueh, and K. G. Shin. Large-scale malware indexing using function-call graphs (extended). Technical Report, Department of Computer Sicence, University of Michigan, 2009.
    • (2009)
    • Hu, X.1    cker Chiueh, T.2    Shin, K.G.3
  • 18
    • 33748193035 scopus 로고    scopus 로고
    • A binary linear programming formulation of the graph edit distance
    • Fellow-Hero, Alfred
    • D. Justice. A binary linear programming formulation of the graph edit distance. IEEE Trans. Pattern Anal. Mach. Intell., 28(8):1200-1214, 2006. Fellow-Hero,, Alfred.
    • (2006) IEEE Trans. Pattern Anal. Mach. Intell , vol.28 , Issue.8 , pp. 1200-1214
    • Justice, D.1
  • 19
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res., 7:2721-2744, 2006.
    • (2006) J. Mach. Learn. Res , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 20
    • 33745670395 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Springer-Verlag
    • C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymorphic worm detection using structural information of executables. In In RAID, pages 207-226. Springer-Verlag, 2005.
    • (2005) In RAID , pp. 207-226
    • Kruegel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 22
    • 48649084773 scopus 로고    scopus 로고
    • L. Martignoni, M. Christodorescu, and S. Jha. Omniunpack: Fast, generic, and safe unpacking of malware. In In Proceedings of the Annual Computer Security Applications Conference ACSAC, 2007.
    • L. Martignoni, M. Christodorescu, and S. Jha. Omniunpack: Fast, generic, and safe unpacking of malware. In In Proceedings of the Annual Computer Security Applications Conference (ACSAC, 2007.
  • 24
    • 24644458373 scopus 로고    scopus 로고
    • An error-tolerant approximate matching algorithm for attributed planar graphs and its application to fingerprint classification
    • M. Neuhaus and H. Bunke. An error-tolerant approximate matching algorithm for attributed planar graphs and its application to fingerprint classification. In SSPR/SPR, pages 180-189, 2004.
    • (2004) SSPR/SPR , pp. 180-189
    • Neuhaus, M.1    Bunke, H.2
  • 26
    • 51249106006 scopus 로고    scopus 로고
    • Deobfuscator: An automated approach to the identification and removal of code obfuscation
    • J. Raber and E. Laspe. Deobfuscator: An automated approach to the identification and removal of code obfuscation. Reverse Engineering, Working Conference on, 0:275-276, 2007.
    • (2007) Reverse Engineering, Working Conference on , vol.0 , pp. 275-276
    • Raber, J.1    Laspe, E.2
  • 31
    • 52649126146 scopus 로고    scopus 로고
    • Tale: A tool for approximate large graph matching
    • Y. Tian and J. M. Patel. Tale: A tool for approximate large graph matching. In ICDE, pages 963-972, 2008.
    • (2008) ICDE , pp. 963-972
    • Tian, Y.1    Patel, J.M.2
  • 32
    • 38149001240 scopus 로고    scopus 로고
    • T.Lee and J.J.Mody. Behavioral classification. http://www.microsoft.com/ downloads/details.aspx?FamilyID=7b5d8cc8-b336-4091-abb5- 2cc500a6c41a&displaylang=en,2006.
    • (2006) Behavioral classification
    • Lee, T.1    Mody, J.J.2
  • 35
    • 0027188633 scopus 로고
    • Data structures and algorithms for nearest neighbor search in general metric spaces
    • P. N. Yianilos. Data structures and algorithms for nearest neighbor search in general metric spaces. In SODA: ACM-SIAM Symposium on Discrete Algorithms, 1993.
    • (1993) SODA: ACM-SIAM Symposium on Discrete Algorithms
    • Yianilos, P.N.1
  • 37
    • 46249119876 scopus 로고    scopus 로고
    • M-tree: A dynamic index for similarity queries in multimedia databases
    • Technical Report 7, HERMES ESPRIT LTR Project
    • P. Zezula, P. Ciaccia, and F. Rabitti. M-tree: A dynamic index for similarity queries in multimedia databases. Technical Report 7, HERMES ESPRIT LTR Project, 1996.
    • (1996)
    • Zezula, P.1    Ciaccia, P.2    Rabitti, F.3
  • 38
    • 0024889169 scopus 로고
    • Simple fast algorithms for the editing distance between trees and related problems
    • K. Zhang and D. Shasha. Simple fast algorithms for the editing distance between trees and related problems. SIAM J. Comput., 18(6):1245-1262, 1989.
    • (1989) SIAM J. Comput , vol.18 , Issue.6 , pp. 1245-1262
    • Zhang, K.1    Shasha, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.