메뉴 건너뛰기




Volumn 7, Issue 4, 2011, Pages 247-258

Graph-based malware detection using dynamic analysis

Author keywords

[No Author keywords available]

Indexed keywords

DATA REPRESENTATIONS; DETECTION METHODS; GLOBAL LEVELS; GRAPH KERNELS; GRAPH-BASED; MALWARE DETECTION; MALWARES; SIMILARITY MATRIX; TRANSITION PROBABILITIES; TWO CLASSIFICATION;

EID: 80255137449     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-011-0152-x     Document Type: Article
Times cited : (262)

References (39)
  • 1
    • 80255131692 scopus 로고    scopus 로고
    • Accessed 5 August
    • Aspack software. http://www. aspack. com/asprotect. html, Accessed 5 August 2010.
    • (2010) Aspack software
  • 6
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Burges C. J. C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2, 121-167 (1998).
    • (1998) Data Min. Knowl. Discov. , vol.2 , pp. 121-167
    • Burges, C.J.C.1
  • 11
    • 77952602657 scopus 로고    scopus 로고
    • Efficient virus detection using dynamic instruction sequences
    • Dai J., Guha R., Lee J.: Efficient virus detection using dynamic instruction sequences. J. Comput. 4(5), 405-414 (2009).
    • (2009) J. Comput. , vol.4 , Issue.5 , pp. 405-414
    • Dai, J.1    Guha, R.2    Lee, J.3
  • 14
    • 0001710505 scopus 로고
    • Analysis of a complex of statistical variables into principal components
    • Hotelling H.: Analysis of a complex of statistical variables into principal components. J. Educ. Psychol. 24(6), 417-441 (1933).
    • (1933) J. Educ. Psychol. , vol.24 , Issue.6 , pp. 417-441
    • Hotelling, H.1
  • 22
    • 34548583274 scopus 로고    scopus 로고
    • A tutorial on spectral clustering
    • Luxburg U.: A tutorial on spectral clustering. Stat. Comput. 17(4), 395-416 (2007).
    • (2007) Stat. Comput. , vol.17 , Issue.4 , pp. 395-416
    • Luxburg, U.1
  • 23
    • 80255123027 scopus 로고    scopus 로고
    • ms680345 October
    • Microsoft, Inc. IsDebuggerPresent function. http://msdn. microsoft. com/en-us/library/ms680345(VS. 85). aspx, October 2010.
    • (2010) IsDebuggerPresent function
  • 24
    • 80255128582 scopus 로고    scopus 로고
    • Malicious software (malware): A security threat to the internet economy
    • Organisation for Economic Co-operation and Development June
    • Organisation for Economic Co-operation and Development. Malicious software (malware): A security threat to the internet economy. White Paper, June 2008.
    • (2008) White Paper
  • 25
    • 80255123024 scopus 로고    scopus 로고
    • Panda labs annual report 2009
    • Panda Security January
    • Panda Security. Panda labs annual report 2009. White Paper, January 2010.
    • (2010) White Paper
  • 26
    • 79955074151 scopus 로고    scopus 로고
    • Improving antivirus accuracy with hypervisor assisted analysis
    • doi: 10.1007/s11416-010-0142-4
    • Quist, D., Liebrock, L., Neil, J.: Improving antivirus accuracy with hypervisor assisted analysis. J. Comput. Virol 1-11 (2010). doi: 10. 1007/s11416-010-0142-4.
    • (2010) J. Comput. Virol , pp. 1-11
    • Quist, D.1    Liebrock, L.2    Neil, J.3
  • 28
    • 33751168025 scopus 로고    scopus 로고
    • N-gram analysis for computer virus detection
    • Reddy D., Pujari A.: N-gram analysis for computer virus detection. J. Comput. Virol. 2, 231-239 (2006).
    • (2006) J. Comput. Virol. , vol.2 , pp. 231-239
    • Reddy, D.1    Pujari, A.2
  • 30
  • 33
    • 79955114244 scopus 로고    scopus 로고
    • Malware detection using assembly and api call sequences
    • doi: 10.1007/s11416-010-0141-5
    • Shankarapani, M., Ramamoorthy, S., Movva, R., Mukkamala, S.: Malware detection using assembly and api call sequences. J. Comput. Virol. pp. 1-13 (2010). doi: 10. 1007/s11416-010-0141-5.
    • (2010) J. Comput. Virol. , pp. 1-13
    • Shankarapani, M.1    Ramamoorthy, S.2    Movva, R.3    Mukkamala, S.4
  • 34
    • 80255123025 scopus 로고    scopus 로고
    • RDGMax Software Software package, November
    • RDGMax Software. RDG Tejon Crypter. Software package, November 2010.
    • (2010) RDG Tejon Crypter


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.