메뉴 건너뛰기




Volumn , Issue , 2011, Pages 181-189

Malware variant detection using similarity search over sets of control flow graphs

Author keywords

computer security; control flow; decompilation; malware classification; static analysi; structuring

Indexed keywords

CONTROL FLOW; DECOMPILATION; MALWARES; STATIC ANALYSI; STRUCTURING;

EID: 84856189723     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2011.26     Document Type: Conference Paper
Times cited : (60)

References (39)
  • 5
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • A. V. Aho and M. J. Corasick, "Efficient string matching: an aid to bibliographic search," Communications of the ACM, vol. 18, p. 340, 1975.
    • (1975) Communications of the ACM , vol.18 , pp. 340
    • Aho, A.V.1    Corasick, M.J.2
  • 6
  • 7
    • 33745670395 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • C. Kruegel, et al., "Polymorphic worm detection using structural information of executables," Lecture notes in computer science, vol. 3858, p. 207, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3858 , pp. 207
    • Kruegel, C.1
  • 8
    • 34547464948 scopus 로고    scopus 로고
    • University of Wisconsin, Madison, Wisconsin, USA Technical Report #1539
    • M. Christodorescu, et al., "Malware normalization," University of Wisconsin, Madison, Wisconsin, USA Technical Report #1539, 2005.
    • (2005) Malware Normalization
    • Christodorescu, M.1
  • 11
    • 33746882464 scopus 로고    scopus 로고
    • Malware phylogeny generation using permutations of code
    • M. E. Karim, et al., "Malware phylogeny generation using permutations of code," Journal in Computer Virology, vol. 1, pp. 13-23, 2005.
    • (2005) Journal in Computer Virology , vol.1 , pp. 13-23
    • Karim, M.E.1
  • 12
    • 60649088451 scopus 로고    scopus 로고
    • McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables
    • R. Perdisci, et al., "McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables," in Proceedings of the 2008 Annual Computer Security Applications Conference, 2008, pp. 301-310.
    • (2008) Proceedings of the 2008 Annual Computer Security Applications Conference , pp. 301-310
    • Perdisci, R.1
  • 20
    • 77954325210 scopus 로고    scopus 로고
    • Graphs, Entropy and Grid Computing: Automatic Comparison of Malware
    • I. Briones and A. Gomez, "Graphs, Entropy and Grid Computing: Automatic Comparison of Malware," in Virus Bulletin Conference, 2008, pp. 1-12.
    • Virus Bulletin Conference, 2008 , pp. 1-12
    • Briones, I.1    Gomez, A.2
  • 21
    • 74049142314 scopus 로고    scopus 로고
    • Large-Scale Malware Indexing Using Function- Call Graphs
    • Chicago, Illinois, USA
    • X. Hu, et al., "Large-Scale Malware Indexing Using Function- Call Graphs," in Computer and Communications Security, Chicago, Illinois, USA, pp. 611-620.
    • Computer and Communications Security , pp. 611-620
    • Hu, X.1
  • 22
    • 77954316719 scopus 로고    scopus 로고
    • Graph-based comparison of Executable Objects (English Version)
    • T. Dullien and R. Rolles, "Graph-based comparison of Executable Objects (English Version)," in SSTIC, 2005.
    • (2005) SSTIC
    • Dullien, T.1    Rolles, R.2
  • 23
    • 36549026467 scopus 로고    scopus 로고
    • Polymorphic malware detection and identification via context-free grammar homomorphism
    • R. T. Gerald and A. F. Lori, "Polymorphic malware detection and identification via context-free grammar homomorphism," Bell Labs Technical Journal, vol. 12, pp. 139-147, 2007.
    • (2007) Bell Labs Technical Journal , vol.12 , pp. 139-147
    • Gerald, R.T.1    Lori, A.F.2
  • 29
    • 33644505034 scopus 로고    scopus 로고
    • DBM-Tree: A Dynamic Metric Access Method Sensitive to Local Density Data
    • M. R. Vieira, et al., "DBM-Tree: A Dynamic Metric Access Method Sensitive to Local Density Data.," in Brazilian Symposium on Databases, Brazil, 2004, pp. 163-177.
    • Brazilian Symposium on Databases, Brazil, 2004 , pp. 163-177
    • Vieira, M.R.1
  • 30
    • 34748820878 scopus 로고    scopus 로고
    • Polyunpack: Automating the hidden-code extraction of unpack-executing malware
    • P. Royal, et al., "Polyunpack: Automating the hidden-code extraction of unpack-executing malware," in Computer Security Applications Conference, 2006, pp. 289-300.
    • Computer Security Applications Conference, 2006 , pp. 289-300
    • Royal, P.1
  • 31
    • 85084160818 scopus 로고    scopus 로고
    • Static disassembly of obfuscated binaries
    • C. Kruegel, et al., "Static disassembly of obfuscated binaries," in USENIX Security Symposium, 2004, pp. 18-18.
    • USENIX Security Symposium, 2004 , pp. 18-18
    • Kruegel, C.1
  • 34
    • 84856154714 scopus 로고    scopus 로고
    • 26 March 2010. Available
    • (2010, 26 March 2010). GDBI Arboretum. Available: http://gbdi.icmc.usp. br/arboretum
    • (2010) GDBI Arboretum
  • 37
    • 84856186789 scopus 로고    scopus 로고
    • 21 September 2009. Available
    • (2009, 21 September 2009). mwcollect Alliance. Available: http://alliance.mwcollect.org
    • (2009)
  • 38
    • 84856146776 scopus 로고    scopus 로고
    • 26 March 2010. Available
    • (2010, 26 March 2010). Cygwin. Available: http://www.cygwin.com
    • (2010)
  • 39
    • 77954335796 scopus 로고    scopus 로고
    • 21 September 2009. Available
    • (2009, 21 September 2009). Offensive Computing. Available: http://www.offensivecomputing.net
    • (2009) Offensive Computing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.