메뉴 건너뛰기




Volumn , Issue , 2009, Pages 23-30

An automated classification system based on the strings of trojan and virus families

Author keywords

Classification; Malware; Strings

Indexed keywords

ADABOOST; ANTI-MALWARE; AUTOMATED CLASSIFICATION SYSTEMS; CLASSIFICATION ACCURACY; CLASSIFICATION ALGORITHM; CLASSIFICATION TECHNIQUE; CROSS VALIDATION; LIBRARY CODES; MALICIOUS CODES; MALWARES; NEAREST NEIGHBOUR; RESEARCH ISSUES; STATISTICAL ALGORITHM; TREE-BASED; TROJANS;

EID: 77950115244     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2009.5403021     Document Type: Conference Paper
Times cited : (104)

References (19)
  • 4
    • 77950137996 scopus 로고    scopus 로고
    • Accessed on June 12, 2008
    • E. Carrera. 4x5: Reverse engineering automation with python, 2007. https://www.blackhat.com/presentations/bh-usa-07/Carrera/Presentation/ bhusa-07-carrera.pdf. pp. 2632, Accessed on June 12, 2008.
    • (2007) 4x5: Reverse engineering automation with python
    • Carrera, E.1
  • 8
    • 54849414050 scopus 로고    scopus 로고
    • An automated virus classification system
    • October
    • M. Gheorghescu, An automated virus classification system. In Virus Bulletin Conference October 2005, pp. 294300, 2005.
    • (2005) Virus Bulletin Conference
    • Gheorghescu, M.1
  • 9
    • 58149090561 scopus 로고    scopus 로고
    • Binary feature extraction and comparison
    • Auckland, December
    • A. Kapoor and J. Spurlock. Binary feature extraction and comparison. In Presentation at AVAR 2006, Auckland, December 35, 2006.
    • (2006) Presentation at AVAR 2006 , vol.35
    • Kapoor, A.1    Spurlock, J.2
  • 13
    • 77950130808 scopus 로고    scopus 로고
    • S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar. Signature generation and detection of malware families. In ACISP 2008. Springer LNCS, 2008.
    • S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar. Signature generation and detection of malware families. In ACISP 2008. Springer LNCS, 2008.
  • 14
    • 72749091289 scopus 로고    scopus 로고
    • Are evolutionary rule learning algorithms appropriate for malware detection?
    • ACM
    • Z. Shafiq, M. Tabish and M. Farooq. Are evolutionary rule learning algorithms appropriate for malware detection? In Proceedings of GECCO09, ACM. 2009.
    • (2009) Proceedings of GECCO09
    • Shafiq, Z.1    Tabish, M.2    Farooq, M.3
  • 16
    • 58149093760 scopus 로고    scopus 로고
    • Function Length as a Tool for Malware Classification
    • R. Tian, L.M. Batten and S.C. Versteeg, Function Length as a Tool for Malware Classification, Malware, 2008.
    • (2008) Malware
    • Tian, R.1    Batten, L.M.2    Versteeg, S.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.