메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1970-1977

Detecting metamorphic malwares using code graphs

Author keywords

code graph; code obfuscation; metamorphic malware; static analysis

Indexed keywords

ANTI VIRUS; CALL GRAPHS; CODE OBFUSCATION; DEFENSE TECHNIQUES; DETECTION MECHANISM; DETECTION TECHNIQUE; GRAPH CODES; MALWARE DETECTION; MALWARES; PROGRAM SEMANTICS; REAL-WORLD;

EID: 77954746422     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1774088.1774505     Document Type: Conference Paper
Times cited : (91)

References (31)
  • 2
    • 77954740803 scopus 로고    scopus 로고
    • Vx heavens. http://vx.netlux.org.
    • Vx Heavens
  • 3
    • 35348932512 scopus 로고    scopus 로고
    • Antiheuristics
    • AVV
    • AVV. Antiheuristics. 29A Magazine, 1(1), 1999.
    • (1999) 29A Magazine , vol.1 , Issue.1
  • 5
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. J. C. Burges. A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov., 2(2):121-167, 1998. (Pubitemid 128695475)
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 6
    • 23744485744 scopus 로고    scopus 로고
    • Testing malware detectors
    • M. Christodorescu and S. Jha. Testing malware detectors. In ISSTA, pages 34-44, 2004.
    • (2004) ISSTA , pp. 34-44
    • Christodorescu, M.1    Jha, S.2
  • 9
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • September
    • F. Cohen. Computer viruses: Theory and experiments. In 7th DOD/NBS Computers and Security Conference, volume 6, pages 22-35, September 1987.
    • (1987) 7th DOD/NBS Computers and Security Conference , vol.6 , pp. 22-35
    • Cohen, F.1
  • 11
    • 77954712504 scopus 로고    scopus 로고
    • Metamorphism in practice
    • M. Driller. Metamorphism in practice. 29A Magazine, 1(6), 2002.
    • (2002) 29A Magazine , vol.1 , Issue.6
    • Driller, M.1
  • 12
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • G. Jacob, H. Debar, and E. Filiol. Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology, 4(3):251-266, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.3 , pp. 251-266
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 14
    • 35349024064 scopus 로고    scopus 로고
    • Metamorphism
    • L. Julus. Metamorphism. 29A Magazine, 1(5), 2000.
    • (2000) 29A Magazine , vol.1 , Issue.5
    • Julus, L.1
  • 15
    • 12244279567 scopus 로고    scopus 로고
    • Learning to detect malicious executables in the wild
    • J. Z. Kolter and M. A. Maloof. Learning to detect malicious executables in the wild. In KDD, pages 470-478, 2004.
    • (2004) KDD , pp. 470-478
    • Kolter, J.Z.1    Maloof, M.A.2
  • 16
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • R. Lyda and J. Hamrock. Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy, 5(2):40-45, 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 18
    • 48649087530 scopus 로고    scopus 로고
    • Limits of static analysis for malware detection
    • A. Moser, C. Kruegel, and E. Kirda. Limits of static analysis for malware detection. In ACSAC, pages 421-430, 2007.
    • (2007) ACSAC , pp. 421-430
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 20
    • 0030736223 scopus 로고    scopus 로고
    • Computer virus-antivirus coevolution
    • C. Nachenberg. Computer virus-antivirus coevolution. Commun. ACM, 40(1):46-51, 1997.
    • (1997) Commun. ACM , vol.40 , Issue.1 , pp. 46-51
    • Nachenberg, C.1
  • 22
    • 77954692973 scopus 로고    scopus 로고
    • Polimorphism
    • Rajaat. Polimorphism. 29A Magazine, 1(3), 1999.
    • (1999) 29A Magazine , vol.1 , Issue.3
    • Rajaat1
  • 23
    • 0036448558 scopus 로고    scopus 로고
    • 0002: Calculation of graph similarity using maximum common edge subgraphs
    • J. W. Raymond, E. J. Gardiner, and P. W. 0002. Rascal: Calculation of graph similarity using maximum common edge subgraphs. Comput. J., 45(6):631-644, 2002.
    • (2002) Comput. J. , vol.45 , Issue.6 , pp. 631-644
    • Raymond, J.W.1    Gardiner, E.J.2    Rascal, P.W.3
  • 24
    • 70349869466 scopus 로고    scopus 로고
    • Signature generation and detection of malware families
    • V. S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar. Signature generation and detection of malware families. In ACISP, pages 336-349, 2008.
    • (2008) ACISP , pp. 336-349
    • Sathyanarayan, V.S.1    Kohli, P.2    Bruhadeshwar, B.3
  • 28
    • 34547197548 scopus 로고    scopus 로고
    • Normalizing metamorphic malware using term rewriting
    • A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. Normalizing metamorphic malware using term rewriting. In SCAM, pages 75-84, 2006.
    • (2006) SCAM , pp. 75-84
    • Walenstein, A.1    Mathur, R.2    Chouchane, M.R.3    Lakhotia, A.4
  • 30
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • C. Willems, T. Holz, and F. C. Freiling. Toward automated dynamic malware analysis using cwsandbox. IEEE Security & Privacy, 5(2):32-39, 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.C.3
  • 31
    • 0040994741 scopus 로고
    • On a certain distance between isomorphism classes of graph
    • B. Zelinka. On a certain distance between isomorphism classes of graph. In Casopis pro pestovani Matematiky, volume 100, pages 371-373, 1975.
    • (1975) Casopis Pro Pestovani Matematiky , vol.100 , pp. 371-373
    • Zelinka, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.