메뉴 건너뛰기




Volumn , Issue , 2010, Pages 721-728

A fast flowgraph based classification system for packed and polymorphic malware on the endhost

Author keywords

Emulation; Malware; Network security; Structural classification; Unpacking

Indexed keywords

CLASSIFICATION ,; CLASSIFICATION SYSTEM; CONTROL FLOWS; EMAIL GATEWAY; EMULATION; FLOW GRAPH; FLOW-GRAPHS; GRAPH ISOMORPHISM; MALICIOUS SOFTWARE; MALWARE DETECTION; MALWARES; MATCHING ALGORITHM; NETWORKED SYSTEMS; PERFORMANCE CHARACTERISTICS; POLYMORPHIC VARIANT; QUERY PROGRAMS; STRING MATCHING; STRUCTURAL CLASSIFICATION; TIME USE;

EID: 77954329802     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2010.121     Document Type: Conference Paper
Times cited : (44)

References (31)
  • 3
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • A.V. Aho and M.J. Corasick, "Efficient string matching: An aid to bibliographic search," Communications of the ACM, vol. 18, no. 6, 1975, pp. 340.
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 340
    • Aho, A.V.1    Corasick, M.J.2
  • 4
    • 54849432819 scopus 로고    scopus 로고
    • Digital genome mapping-advanced binary malware analysis
    • E. Carrera and G. Erdélyi, "Digital genome mapping-advanced binary malware analysis," Virus Bulletin Conference, 2004, pp. 187-197.
    • (2004) Virus Bulletin Conference , pp. 187-197
    • Carrera, E.1    Erdélyi, G.2
  • 8
    • 48649089436 scopus 로고    scopus 로고
    • Improving proactive detection of packed malware
    • A. Stepan, "Improving proactive detection of packed malware," Virus Bulletin Conference, 2006.
    • (2006) Virus Bulletin Conference
    • Stepan, A.1
  • 10
    • 36849096063 scopus 로고    scopus 로고
    • Imds: Intelligent malware detection system
    • Y. Ye, D. Wang, T. Li and D. Ye, "Imds: Intelligent malware detection system," ACM, 2007, pp. 1047.
    • (2007) ACM , pp. 1047
    • Ye, Y.1    Wang, D.2    Li, T.3    Ye, D.4
  • 12
    • 60649088451 scopus 로고    scopus 로고
    • Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables
    • IEEE Computer Society Washington, DC, USA
    • R. Perdisci, A. Lanzi and W. Lee, "Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables," Proceedings of the 2008 Annual Computer Security Applications Conference, IEEE Computer Society Washington, DC, USA, 2008, pp. 301-310.
    • (2008) Proceedings of the 2008 Annual Computer Security Applications Conference , pp. 301-310
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 14
    • 54849414050 scopus 로고    scopus 로고
    • An automated virus classification system
    • M. Gheorghescu, "An automated virus classification system," Virus Bulletin Conference, 2005, pp. 294-300.
    • (2005) Virus Bulletin Conference , pp. 294-300
    • Gheorghescu, M.1
  • 15
    • 77954316719 scopus 로고    scopus 로고
    • Graph-based comparison of executable objects (English version)
    • T. Dullien and R. Rolles, "Graph-based comparison of executable objects (english version)," SSTIC, 2005.
    • (2005) SSTIC
    • Dullien, T.1    Rolles, R.2
  • 16
    • 77954325210 scopus 로고    scopus 로고
    • Graphs, entropy and grid computing: Automatic comparison of malware
    • I. Briones and A. Gomez, "Graphs, entropy and grid computing: Automatic comparison of malware," Virus Bulletin Conference, 2008, pp. 1-12.
    • (2008) Virus Bulletin Conference , pp. 1-12
    • Briones, I.1    Gomez, A.2
  • 17
    • 77954328326 scopus 로고    scopus 로고
    • Zynamics, "Vxclass," http://www.zynamics.com/vxclass.html.
    • Vxclass
  • 18
    • 57049171932 scopus 로고    scopus 로고
    • Binhunt: Automatically finding semantic differences in binary programs
    • Springer
    • D. Gao, M.K. Reiter and D. Song, "Binhunt: Automatically finding semantic differences in binary programs," Information and Communications Security, Springer, 2008, pp. 238-255.
    • (2008) Information and Communications Security , pp. 238-255
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 22
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • R. Lyda and J. Hamrock, "Using entropy analysis to find encrypted and packed malware," IEEE Security and Privacy, vol. 5, no. 2, 2007, pp. 40.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 40
    • Lyda, R.1    Hamrock, J.2
  • 25
    • 0027188633 scopus 로고
    • Data structures and algorithms for nearest neighbor search in general metric spaces
    • Society for Industrial and Applied Mathematics
    • N.Y. Peter, "Data structures and algorithms for nearest neighbor search in general metric spaces," Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms, Society for Industrial and Applied Mathematics, 1993, pp. 311-321.
    • (1993) Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms , pp. 311-321
    • Peter, N.Y.1
  • 26
    • 77954335796 scopus 로고    scopus 로고
    • "Offensive computing," 2009; http://www.offensivecomputing.net.
    • (2009) Offensive Computing
  • 27
    • 77954324163 scopus 로고    scopus 로고
    • "Mwcollect alliance," 2009; http://alliance.mwcollect.org.
    • (2009) Mwcollect Alliance
  • 28
    • 0019049469 scopus 로고
    • An approach to the problem of detranslation of computer programs
    • R.N. Horspool and N. Marovac, "An approach to the problem of detranslation of computer programs," The Computer Journal, vol. 23, no. 3, 1979, pp. 223-229.
    • (1979) The Computer Journal , vol.23 , Issue.3 , pp. 223-229
    • Horspool, R.N.1    Marovac, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.