메뉴 건너뛰기




Volumn , Issue , 2011, Pages 23-30

Collective classification for packed executable identification

Author keywords

Executable packing; Machine learning; Malware

Indexed keywords

ACCURACY RATE; ANTI VIRUS; COLLECTIVE LEARNING; EMPIRICAL VALIDATION; EXECUTABLES; MACHINE-LEARNING; MALICIOUS EXECUTABLES; MALWARES; PACKED EXECUTABLES; REAL CODE; SIGNATURE SCANNING; STATIC FEATURES; SUPERVISED LEARNING METHODS; SUPERVISED MACHINE LEARNING;

EID: 80053652695     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2030376.2030379     Document Type: Conference Paper
Times cited : (33)

References (33)
  • 4
    • 73449134031 scopus 로고    scopus 로고
    • Anti-debugging and anti-emulation techniques
    • A. Danielescu. Anti-debugging and anti-emulation techniques. CodeBreakers Journal, 5(1), 2008. Available online: http://www.codebreakers-journal.com/.
    • (2008) CodeBreakers Journal , vol.5 , Issue.1
    • Danielescu, A.1
  • 5
    • 79958191725 scopus 로고    scopus 로고
    • Data Rescue. Universal PE Unpacker plug-in. Available online: http://www.datarescue.com/idabase/unpack-pe.
    • Universal PE Unpacker Plug-in
  • 7
    • 79958216590 scopus 로고    scopus 로고
    • Faster Universal Unpacker, 1999. Available online: http://code.google. com/p/fuu/.
    • (1999) Faster Universal Unpacker
  • 12
    • 0001600762 scopus 로고
    • Information gain and a general measure of correlation
    • J. Kent. Information gain and a general measure of correlation. Biometrika, 70(1):163-173, 1983.
    • (1983) Biometrika , vol.70 , Issue.1 , pp. 163-173
    • Kent, J.1
  • 13
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • R. Lyda and J. Hamrock. Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy, 5(2):40-45, 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 16
    • 80053629393 scopus 로고    scopus 로고
    • Useful and useless statistics about viruses and anti-virus programs
    • M. Morgenstern and H. Pilz. Useful and useless statistics about viruses and anti-virus programs. In Proceedings of the CARO Workshop, 2010. Available online: www.f-secure.com/weblog/archives/Maik-Morgenstern-Statistics.pdf.
    • (2010) Proceedings of the CARO Workshop
    • Morgenstern, M.1    Pilz, H.2
  • 17
    • 79958242266 scopus 로고    scopus 로고
    • Collective classification for text classification
    • G. Namata, P. Sen, M. Bilgic, and L. Getoor. Collective classification for text classification. Text Mining, pages 51-69, 2009.
    • (2009) Text Mining , pp. 51-69
    • Namata, G.1    Sen, P.2    Bilgic, M.3    Getoor, L.4
  • 19
    • 80053647027 scopus 로고    scopus 로고
    • PEiD. PEiD webpage, 2010. Available online: http://www.peid.info/.
    • (2010) PEiD Webpage
  • 20
    • 50149118846 scopus 로고    scopus 로고
    • Classification of packed executables for accurate computer virus detection
    • R. Perdisci, A. Lanzi, and W. Lee. Classification of packed executables for accurate computer virus detection. Pattern Recognition Letters, 29(14):1941-1946, 2008.
    • (2008) Pattern Recognition Letters , vol.29 , Issue.14 , pp. 1941-1946
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 25
    • 79958243228 scopus 로고    scopus 로고
    • PE-Probe: Leveraging packer detection and structural information to detect malicious portable executables
    • M. Shafiq, S. Tabish, and M. Farooq. PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables. In Proceedings of the Virus Bulletin Conference (VB), 2009.
    • (2009) Proceedings of the Virus Bulletin Conference (VB)
    • Shafiq, M.1    Tabish, S.2    Farooq, M.3
  • 28
    • 67650330214 scopus 로고    scopus 로고
    • Comparative analysis of regression and machine learning methods for predicting fault proneness models
    • Y. Singh, A. Kaur, and R. Malhotra. Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in Technology, 35(2):183-193, 2009.
    • (2009) International Journal of Computer Applications in Technology , vol.35 , Issue.2 , pp. 183-193
    • Singh, Y.1    Kaur, A.2    Malhotra, R.3
  • 32
    • 80053629561 scopus 로고    scopus 로고
    • VX Heavens. Available online: http://vx.netlux.org/.
    • VX Heavens


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.