메뉴 건너뛰기




Volumn , Issue , 2011, Pages 309-320

BitShred: Feature hashing malware for scalable triage and semantic analysis

Author keywords

Co clustering; Feature hashing; Hadoop; Malware triage

Indexed keywords

CO-CLUSTERING; FEATURE HASHING; HADOOP; HIGH-DIMENSIONAL FEATURE SPACE; MALWARE ANALYSIS; MALWARES; PARALLELIZED VERSION; SEMANTIC ANALYSIS; SIMILARITY ANALYSIS; SINGLE CPU;

EID: 80755168347     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046742     Document Type: Conference Paper
Times cited : (251)

References (39)
  • 1
    • 80755188379 scopus 로고    scopus 로고
    • Apache hadoop. http://hadoop.apache.org/.
  • 2
    • 80755174254 scopus 로고    scopus 로고
    • CMU Cloud Computer Cluster. http://www2.pdl.cmu.edu/~twiki/cgi-bin/view/ OpenCloud/ClusterOverview.
  • 3
    • 80755144110 scopus 로고    scopus 로고
    • Malware Analysis System. http://mwanalysis.org/.
  • 4
    • 80755144108 scopus 로고    scopus 로고
    • Offensive Computing. http://www.offensivecomputing.net/.
  • 5
    • 80755188377 scopus 로고    scopus 로고
    • SimMetrics. http://sourceforge.net/projects/simmetrics/.
    • SimMetrics
  • 6
    • 80755160293 scopus 로고    scopus 로고
    • VirusTotal. http://www.virustotal.com/.
  • 7
    • 80755160292 scopus 로고    scopus 로고
    • zynamics bindiff. http://www.zynamics.com/bindiff.html.
  • 8
    • 80755144109 scopus 로고    scopus 로고
    • April
    • Symantec internet security threat report. http://www.symantec.com/ business/theme.jsp?themeid=threatreport, April 2010.
    • (2010)
  • 10
    • 37549058056 scopus 로고    scopus 로고
    • Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
    • A. Andoni and P. Indyk. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM, 51(1):177-122, 2008.
    • (2008) Communications of the ACM , vol.51 , Issue.1 , pp. 177-122
    • Andoni, A.1    Indyk, P.2
  • 14
    • 80755188378 scopus 로고    scopus 로고
    • D. Bernstein. http://www.cse.yorku.ca/~oz/hash.html.
    • Bernstein, D.1
  • 15
    • 70450232823 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. Broder and M. Mitzenmacher. Network applications of bloom filters: A survey. Internet Mathematics, 1(4):485-509, 2005.
    • (2005) Internet Mathematics , vol.1 , Issue.4 , pp. 485-509
    • Broder, A.1    Mitzenmacher, M.2
  • 18
    • 70349240080 scopus 로고    scopus 로고
    • Ether: Malware analysis via hardware virtualization extensions
    • A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In ACM CCS, 2008.
    • (2008) ACM CCS
    • Dinaburg, A.1    Royal, P.2    Sharif, M.3    Lee, W.4
  • 23
    • 33746882464 scopus 로고    scopus 로고
    • Malware phylogeny generation using permutations of code
    • DOI 10.1007/s11416-005-0002-9
    • M. Karim, A. Walenstein, A. Lakhotia, and L. Parida. Malware phylogeny generation using permutations of code. Journal in Computer Virology, 1(1):13-23, November 2005. (Pubitemid 44195063)
    • (2005) Journal in Computer Virology , vol.1 , Issue.1-2 , pp. 13-23
    • Karim, Md.E.1    Walenstein, A.2    Lakhotia, A.3    Parida, L.4
  • 25
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • J. Z. Kolter and M. A. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 7:2721-2744, Dec. 2006. (Pubitemid 46011490)
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Zico Kolter, J.1    Maloof, M.A.2
  • 30
    • 67149126890 scopus 로고    scopus 로고
    • Disco: Distributed co-clustering with map-reduce
    • S. Papadimitrou and J. Sun. Disco: Distributed co-clustering with map-reduce. In Proceedings of ICDM, 2008.
    • (2008) Proceedings of ICDM
    • Papadimitrou, S.1    Sun, J.2
  • 31
    • 50149118846 scopus 로고    scopus 로고
    • Classification of packed executables for accurate computer virus detection
    • R. Perdisci, A. Lanzi, and W. Lee. Classification of packed executables for accurate computer virus detection. Pattern Recogn. Lett., 29(14):1941-1946, 2008.
    • (2008) Pattern Recogn. Lett. , vol.29 , Issue.14 , pp. 1941-1946
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 32
    • 85076751448 scopus 로고    scopus 로고
    • Behavioral clustering of HTTP-based malware and signature generation using malicious network traces
    • R. Perdisci, W. Lee, and N. Feamster. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. In Proceedings of NSDI, 2010.
    • (2010) Proceedings of NSDI
    • Perdisci, R.1    Lee, W.2    Feamster, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.