메뉴 건너뛰기




Volumn 5965 LNCS, Issue , 2010, Pages 35-43

Idea: Opcode-sequence-based malware detection

Author keywords

Computer security; Machine learning; Malware detection

Indexed keywords

ANTI VIRUS; ANTIVIRUS SOFTWARES; COMPUTER SECURITY; FREQUENCY OF APPEARANCE; MACHINE-LEARNING; MALICIOUS CODES; MALWARE DETECTION; MALWARES; OP-CODE SEQUENCE; OR-NETWORKS; SECURITY THREATS;

EID: 77949503891     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11747-3_3     Document Type: Conference Paper
Times cited : (170)

References (19)
  • 1
    • 77949517522 scopus 로고    scopus 로고
    • Karsperky-Labs: Kaspersky Security Bulletin: Statistics 2008 (2009)
    • Karsperky-Labs: Kaspersky Security Bulletin: Statistics 2008 (2009)
  • 2
    • 84924223669 scopus 로고    scopus 로고
    • Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, February 2003, pp. 169-186 (2003)
    • Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium, February 2003, pp. 169-186 (2003)
  • 5
    • 77949532558 scopus 로고    scopus 로고
    • Last accessed: September 29, 2009
    • VX heavens (2009), http://vx.netlux.org/ (Last accessed: September 29, 2009)
    • VX heavens (2009)
  • 7
    • 24344458137 scopus 로고    scopus 로고
    • Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy
    • Peng, H., Long, F., Ding, C.: Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1226-1238 (2005)
    • (2005) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.1226-1238
    • Peng, H.1    Long, F.2    Ding, C.3
  • 9
    • 41849115277 scopus 로고    scopus 로고
    • Estimating the Selectivity of tf-idf based Cosine Similarity Predicates
    • Tata, S., Patel, J.: Estimating the Selectivity of tf-idf based Cosine Similarity Predicates. SIGMOD Record 36(2), 75-80 (2007)
    • (2007) SIGMOD Record , vol.36 , Issue.2 , pp. 75-80
    • Tata, S.1    Patel, J.2
  • 10
    • 54849432819 scopus 로고    scopus 로고
    • Digital genome mapping-advanced binary malware analysis
    • Carrera, E., Erdélyi, G.: Digital genome mapping-advanced binary malware analysis. In: Virus Bulletin Conference, pp. 187-197 (2004)
    • (2004) Virus Bulletin Conference , pp. 187-197
    • Carrera, E.1    Erdélyi, G.2
  • 16
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
    • Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143-163. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 19
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy 5(2), 32-39 (2007)
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.