메뉴 건너뛰기




Volumn , Issue , 2011, Pages 396-401

Defining malware families based on analyst insights

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTIC METHOD; ANTI VIRUS; BLIND CLASSIFICATION; BLOOM FILTERS; COMPLEX PROCESSES; CYBER-ATTACKS; HOST-BASED; MALICIOUS CODES; MALICIOUS-CODE ANALYSIS; MALWARES; OBJECTIVE CRITERIA; ROADMAP; SIGNATURE GENERATION; SIMILARITY MEASUREMENTS; STRUCTURAL INFORMATION;

EID: 84855800908     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/THS.2011.6107902     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 2
    • 38149089416 scopus 로고    scopus 로고
    • Automated classification and analysis of internet malware
    • ser. Lecture Notes in Computer Science, C. Krügel, R. Lippmann, and A. Clark, Eds. Springer
    • M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," in RAID, ser. Lecture Notes in Computer Science, C. Krügel, R. Lippmann, and A. Clark, Eds., vol. 4637. Springer, 2007, pp. 178-197.
    • (2007) RAID , vol.4637 , pp. 178-197
    • Bailey, M.1    Oberheide, J.2    Andersen, J.3    Mao, Z.M.4    Jahanian, F.5    Nazario, J.6
  • 5
    • 52249094557 scopus 로고    scopus 로고
    • Identifying almost identical files using context triggered piecewise hashing
    • J. D. Kornblum, "Identifying almost identical files using context triggered piecewise hashing," Digital Investigation, vol. 3, no. Supplement-1, pp. 91-97, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. 1 , pp. 91-97
    • Kornblum, J.D.1
  • 9
    • 84855793418 scopus 로고    scopus 로고
    • Malware classification based on call graph clustering
    • J. Kinable and O. Kostakis, "Malware classification based on call graph clustering," CoRR, vol. abs/1008.4365, 2010.
    • (2010) CoRR , vol.1008 , Issue.4365
    • Kinable, J.1    Kostakis, O.2
  • 10
    • 84855795320 scopus 로고    scopus 로고
    • A malware instruction set for behavior-based analysis
    • ser. LNI, F. C. Freiling, Ed.
    • P. Trinius, C. Willems, T. Holz, and K. Rieck, "A malware instruction set for behavior-based analysis," in Sicherheit, ser. LNI, F. C. Freiling, Ed., vol. 170. GI, 2010, pp. 205-216.
    • (2010) Sicherheit , vol.170 , Issue.GI , pp. 205-216
    • Trinius, P.1    Willems, C.2    Holz, T.3    Rieck, K.4
  • 11
  • 12
    • 78249253017 scopus 로고    scopus 로고
    • On challenges in evaluating malware clustering
    • ser. Lecture Notes in Computer Science, S. Jha, R. Sommer, and C. Kreibich, Eds. Springer
    • P. Li, L. Liu, D. Gao, and M. K. Reiter, "On challenges in evaluating malware clustering," in RAID, ser. Lecture Notes in Computer Science, S. Jha, R. Sommer, and C. Kreibich, Eds., vol. 6307. Springer, 2010, pp. 238-255.
    • (2010) RAID , vol.6307 , pp. 238-255
    • Li, P.1    Liu, L.2    Gao, D.3    Reiter, M.K.4
  • 13
    • 84924223669 scopus 로고    scopus 로고
    • Static analysis of executables to detect malicious patterns
    • USENIX Association. USENIX Association, Aug.
    • M. Christodorescu and S. Jha, "Static analysis of executables to detect malicious patterns," in Proceedings of the 12th USENIX Security Symposium (Security'03), USENIX Association. USENIX Association, Aug. 2003, pp. 169-186.
    • (2003) Proceedings of the 12th USENIX Security Symposium (Security'03) , pp. 169-186
    • Christodorescu, M.1    Jha, S.2
  • 16
    • 84855801128 scopus 로고    scopus 로고
    • [Online]
    • V. Alvarez, "The yara project." [Online]. Available: http://code.google.com/p/yara-project
    • Alvarez, V.1
  • 20
    • 84855793421 scopus 로고    scopus 로고
    • Exploiting similarity between variants to defeat malware
    • July 2007
    • D. Quist, "Exploiting similarity between variants to defeat malware," in Proceedings of BlackHat USA 2007, July 2007.
    • (2007) Proceedings of BlackHat USA
    • Quist, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.