메뉴 건너뛰기




Volumn 7, Issue 4, 2011, Pages 233-245

Malware classification based on call graph clustering

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; AUTOMATIC DETECTION; CALL GRAPHS; DENSITY-BASED SPATIAL CLUSTERING OF APPLICATIONS WITH NOISE; DETECTION SCHEME; DETECTION TECHNIQUE; EXECUTABLES; GRAPH EDIT DISTANCE; GRAPH MATCHINGS; GRAPH SIMILARITY; K-MEDOIDS; LARGE AMOUNTS OF DATA; MALWARES; MANUAL CLASSIFICATION; STRUCTURAL SIMILARITY;

EID: 80255126150     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-011-0151-y     Document Type: Article
Times cited : (179)

References (46)
  • 3
    • 80051684590 scopus 로고    scopus 로고
    • Ph. D. dissertation, Technischen Universität Wien, December
    • Bayer, U.: Large-scale dynamic malware analysis. Ph. D. dissertation, Technischen Universität Wien, December 2009.
    • (2009) Large-scale dynamic malware analysis
    • Bayer, U.1
  • 7
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • doi:10.1007/s11416-008-0084-2
    • Borello J.-M., Mé L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4, 211-220 (2008). doi: 10. 1007/s11416-008-0084-2.
    • (2008) J. Comput. Virol. , vol.4 , pp. 211-220
    • Borello, J.-M.1    Mé, L.2
  • 9
    • 77954325210 scopus 로고    scopus 로고
    • Graphs, entropy and grid computing: Automatic comparison of malware
    • Retrieved on May 2010
    • Briones, I., Gomez, A.: Graphs, entropy and grid computing: Automatic comparison of malware. In: Proceedings of the 2008 Virus Bulletin Conference, 2008, Retrieved on May 2010. http://www. virusbtn. com/conference/vb2008.
    • (2008) Proceedings of the 2008 Virus Bulletin Conference
    • Briones, I.1    Gomez, A.2
  • 10
  • 11
    • 54849432819 scopus 로고    scopus 로고
    • Digital genome mapping-advanced binary malware analysis
    • Retrieved on May 2010
    • Carrera, E., Erdélyi, G.: Digital genome mapping-advanced binary malware analysis. In: Virus Bulletin Conference, 2004, Retrieved on May 2010. http://www. virusbtn. com/conference/vb2004.
    • (2004) Virus Bulletin Conference
    • Carrera, E.1    Erdélyi, G.2
  • 18
    • 0032597935 scopus 로고    scopus 로고
    • A two-stage discrete optimization method for largest common subgraph problems
    • 19990825
    • Funabiki, N., Kitamichi, J.: A two-stage discrete optimization method for largest common subgraph problems. In: IEICE Transactions on Information and Systems, 82(8), 1145-1153, 19990825. http://ci. nii. ac. jp/naid/110003210164/en/.
    • IEICE Transactions on Information and Systems , vol.82 , Issue.8 , pp. 1145-1153
    • Funabiki, N.1    Kitamichi, J.2
  • 19
    • 45549097571 scopus 로고    scopus 로고
    • Image categorization: Graph edit distance+edge direction histogram
    • Gao X., Xiao B., Tao D., Li X.: Image categorization: Graph edit distance+edge direction histogram. Pattern Recognit. 41(10), 3179-3191 (2008).
    • (2008) Pattern Recognit. , vol.41 , Issue.10 , pp. 3179-3191
    • Gao, X.1    Xiao, B.2    Tao, D.3    Li, X.4
  • 21
    • 80255123585 scopus 로고    scopus 로고
    • Hex-rays
    • Retrieved on 12-2-2010
    • Hex-rays. The IDA Pro disassembler and debugger. http://www. hex-rays. com/idapro/. Retrieved on 12-2-2010.
    • The IDA Pro disassembler and debugger
  • 23
    • 74049142314 scopus 로고    scopus 로고
    • Large-scale malware indexing using function-call graphs
    • ACM In: Al-Shaer, E., Jha, S., Keromytis, A. D. (eds)
    • Hu, X., Chiueh, T., Shin, K. G.: Large-scale malware indexing using function-call graphs. In: Al-Shaer, E., Jha, S., Keromytis, A. D. (eds) ACM Conference on Computer and Communications Security, pp. 611-620. ACM (2009).
    • (2009) ACM Conference on Computer and Communications Security , pp. 611-620
    • Hu, X.1    Chiueh, T.2    Shin, K.G.3
  • 24
    • 33748193035 scopus 로고    scopus 로고
    • A binary linear programming formulation of the graph edit distance
    • Justice, A., Hero, D.: A binary linear programming formulation of the graph edit distance. In: IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, pp. 1200-1214 (2006). http://people. ee. duke. edu/~lcarin/JusticeHero. pdf.
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , pp. 1200-1214
    • Justice, A.1    Hero, D.2
  • 26
    • 80255123580 scopus 로고    scopus 로고
    • Master's thesis, Department of Information and Computer Science, Aalto University, Finland
    • Kinable, J.: Malware Detection Through Call Graphs. Master's thesis, Department of Information and Computer Science, Aalto University, Finland (2010).
    • (2010) Malware Detection Through Call Graphs
    • Kinable, J.1
  • 30
    • 48649087530 scopus 로고    scopus 로고
    • Limits of static analysis for malware detection
    • doi: 10.1109/ACSAC.2007.21
    • Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Computer Security Applications Conference, 2007, pp. 421-430. doi: 10. 1109/ACSAC. 2007. 21.
    • (2007) Computer Security Applications Conference , pp. 421-430
    • Moser, A.1    Kruegel, C.2    Kirda, E.3
  • 33
    • 0036663707 scopus 로고    scopus 로고
    • Maximum common subgraph isomorphism algorithms for the matching of chemical structures
    • Raymond J. W., Willett P.: Maximum common subgraph isomorphism algorithms for the matching of chemical structures. J. Comput. Aided Molecular Design 16, 2002 (2002).
    • (2002) J. Comput. Aided Molecular Design , vol.16 , pp. 2002
    • Raymond, J.W.1    Willett, P.2
  • 34
    • 64849091214 scopus 로고    scopus 로고
    • Approximate graph edit distance computation by means of bipartite graph matching
    • 7th IAPR-TC15 Workshop on Graph-based Representations (GbR 2007)
    • Riesen, K., Bunke, H.: Approximate graph edit distance computation by means of bipartite graph matching. Image Vis. Comput. 27(7), 950-959, (2009). 7th IAPR-TC15 Workshop on Graph-based Representations (GbR 2007).
    • (2009) Image Vis. Comput. , vol.27 , Issue.7 , pp. 950-959
    • Riesen, K.1    Bunke, H.2
  • 35
    • 38149054971 scopus 로고    scopus 로고
    • Bipartite graph matching for computing the edit distance of graphs
    • doi: 10.1007/978-3-540-72903-7_1
    • Riesen, K., Neuhaus, M., Bunke, H.: Bipartite graph matching for computing the edit distance of graphs. In: Graph-Based Representations in Pattern Recognition, 2007, pp. 1-12. doi: 10. 1007/978-3-540-72903-7_1.
    • (2007) Graph-Based Representations in Pattern Recognition , pp. 1-12
    • Riesen, K.1    Neuhaus, M.2    Bunke, H.3
  • 36
    • 0023453329 scopus 로고
    • Silhouettes: a graphical aid to the interpretation and validation of cluster analysis
    • Rousseeuw P.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20(1), 53-65 (1987).
    • (1987) J. Comput. Appl. Math. , vol.20 , Issue.1 , pp. 53-65
    • Rousseeuw, P.1
  • 37
    • 0018466659 scopus 로고
    • Constructing the call graph of a program
    • Ryder B.: Constructing the call graph of a program. IEEE Trans. Softw. Eng. SE-5(3), 216-226 (1979).
    • (1979) IEEE Trans. Softw. Eng. , vol.SE-5 , Issue.3 , pp. 216-226
    • Ryder, B.1
  • 41
    • 33748215463 scopus 로고
    • The determination of maximum common substructures by a genetic algorithm: Application in synthesis design and for the structural analysis of biological activity
    • Wagener M., Gasteiger J.: The determination of maximum common substructures by a genetic algorithm: Application in synthesis design and for the structural analysis of biological activity. Angewandte Chem. Int. Ed. 33, 1189-1192 (1994).
    • (1994) Angewandte Chem. Int. Ed. , vol.33 , pp. 1189-1192
    • Wagener, M.1    Gasteiger, J.2
  • 42
    • 84875656430 scopus 로고    scopus 로고
    • Exploiting similarity between variants to defeat malware: vilo method for comparing and searching binary programs
    • Walenstein, A., Venable, M., Hayes, M., Thompson, C., Lakhotia, A.: Exploiting similarity between variants to defeat malware: vilo method for comparing and searching binary programs. In: Proceedings of BlackHat DC 2007 (2007).
    • (2007) Proceedings of BlackHat DC 2007
    • Walenstein, A.1    Venable, M.2    Hayes, M.3    Thompson, C.4    Lakhotia, A.5
  • 45
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using cwsandbox. IEEE Security Privacy 5, 32-39 (2007). http://portal. acm. org/citation. cfm?id=1262542. 1262675.
    • (2007) IEEE Security Privacy , vol.5 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3
  • 46
    • 77954692432 scopus 로고    scopus 로고
    • Comparing stars: on approximating graph edit distance
    • Zeng Z., Tung A. K. H., Wang J., Feng J., Zhou L.: Comparing stars: on approximating graph edit distance. PVLDB 2(1), 25-36 (2009).
    • (2009) Pvldb , vol.2 , Issue.1 , pp. 25-36
    • Zeng, Z.1    Tung, A.K.H.2    Wang, J.3    Feng, J.4    Zhou, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.