메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3-14

Improving malware classification: Bridging the static/dynamic gap

Author keywords

Computer Security; Machine Learning; Malware; Multiple Kernel Learning

Indexed keywords

CLASSIFICATION ACCURACY; CLASSIFICATION FRAMEWORK; CLASSIFICATION SYSTEM; DATA-SOURCES; DYNAMIC DETECTION; DYNAMIC FEATURES; MALWARES; MULTIPLE KERNEL LEARNING; RESEARCH COMMUNITIES; SIMILARITY METRICS; STATIC AND DYNAMIC; UNIFIED FRAMEWORK;

EID: 84869822279     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2381896.2381900     Document Type: Conference Paper
Times cited : (119)

References (51)
  • 1
    • 84870683360 scopus 로고    scopus 로고
    • Accessed June
    • Offensive Computing. http://www.offensivecomputing.net/, Accessed June 2011.
    • (2011)
  • 2
    • 84870699187 scopus 로고    scopus 로고
    • Accessed October
    • Virus Total. http://www.virustotal.com/, Accessed October 2011.
    • (2011)
  • 3
    • 84870717820 scopus 로고    scopus 로고
    • Accessed 6 October
    • Portable Executable iDentifier. http://peid.info/, Accessed 6 October 2011.
    • (2011)
  • 5
    • 84870702147 scopus 로고    scopus 로고
    • Anubis. http://anubis.iseclab.org/, 2009.
    • (2009)
  • 12
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Christopher J. C. Burges. A Tutorial on Support Vector Machines for Pattern Recognition. Data Mining and Knowledge Discovery, 2:121-167, 1998.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , pp. 121-167
    • Burges, C.J.C.1
  • 14
    • 77952602657 scopus 로고    scopus 로고
    • Efficient virus detection using dynamic instruction sequences
    • Jianyong Dai, Ratan Guha, and Joohan Lee. Efficient Virus Detection Using Dynamic Instruction Sequences. Journal of Computers, 4(5), 2009.
    • (2009) Journal of Computers , vol.4 , Issue.5
    • Dai, J.1    Guha, R.2    Lee, J.3
  • 17
    • 0027657329 scopus 로고
    • Semi-infinite programming: Theory, methods, and applications
    • September
    • R. Hettich and K. O. Kortanek. Semi-Infinite Programming: Theory, Methods, and Applications. SIAM Review, 35:380-429, September 1993.
    • (1993) SIAM Review , vol.35 , pp. 380-429
    • Hettich, R.1    Kortanek, K.O.2
  • 18
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • January
    • Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. Intrusion Detection Using Sequences of System Calls. Journal of Computer Security, 6(3):151-180, January 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 21
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • December
    • J. Zico Kolter and Marcus A. Maloof. Learning to Detect and Classify Malicious Executables in the Wild. The Journal of Machine Learning Research, 7:2721-2744, December 2006.
    • (2006) The Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Zico Kolter, J.1    Maloof, M.A.2
  • 22
    • 33745670395 scopus 로고    scopus 로고
    • Polymorphic worm detection using structural information of executables
    • Springer Berlin / Heidelberg
    • Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, and Giovanni Vigna. Polymorphic Worm Detection Using Structural Information of Executables. In Recent Advances in Intrusion Detection, pages 207-226. Springer Berlin / Heidelberg, 2006.
    • (2006) Recent Advances in Intrusion Detection , pp. 207-226
    • Kruegel, C.1    Kirda, E.2    Mutz, D.3    Robertson, W.4    Vigna, G.5
  • 26
    • 34548583274 scopus 로고    scopus 로고
    • A tutorial on spectral clustering
    • Ulrike Luxburg. A Tutorial on Spectral Clustering. Statistics and Computing, 17(4):395-416, 2007.
    • (2007) Statistics and Computing , vol.17 , Issue.4 , pp. 395-416
    • Luxburg, U.1
  • 27
    • 34047129159 scopus 로고    scopus 로고
    • Using entropy analysis to find encrypted and packed malware
    • Robert Lyda and James Hamrock. Using Entropy Analysis to Find Encrypted and Packed Malware. IEEE Security & Privacy, 5(2):40-45, 2007.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.2 , pp. 40-45
    • Lyda, R.1    Hamrock, J.2
  • 33
    • 84870724468 scopus 로고    scopus 로고
    • IDA Pro. http://www.hex-rays.com/products/ida/index.shtml, 2012.
    • (2012)
  • 34
    • 84869832423 scopus 로고    scopus 로고
    • Improving antivirus accuracy with hypervisor assisted analysis
    • Daniel Quist, Lorie Liebrock, and Joshua Neil. Improving Antivirus Accuracy with Hypervisor Assisted Analysis. Journal in Computer Virology, pages 1-11, 2010.
    • (2010) Journal in Computer Virology , pp. 1-11
    • Quist, D.1    Liebrock, L.2    Neil, J.3
  • 47
    • 84869815087 scopus 로고    scopus 로고
    • Symantec. White Paper, April
    • Symantec. Internet Security Threat Report, Volume 16. White Paper, April 2011.
    • (2011) Internet Security Threat Report , vol.16
  • 48
    • 84870677902 scopus 로고    scopus 로고
    • Accessed 6 October
    • The Silicon Realms Toolworks. Armadillo Software Protection System. http://www.siliconrealms.com/, Accessed 6 October 2011.
    • (2011) Armadillo Software Protection System
  • 49
    • 84870703237 scopus 로고    scopus 로고
    • Accessed 6 October
    • UPX: The Ultimate Packer for eXecutables. http://upx.sourceforge.net/, Accessed 6 October 2011.
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.