메뉴 건너뛰기




Volumn 9, Issue 3, 2013, Pages 159-170

Simple substitution distance and metamorphic detection

Author keywords

[No Author keywords available]

Indexed keywords

MALWARES; METAMORPHIC MALWARE; SIMPLE SUBSTITUTION; SOFTWARE SIMILARITIES;

EID: 84880591935     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-013-0184-5     Document Type: Article
Times cited : (55)

References (31)
  • 1
    • 67349123665 scopus 로고    scopus 로고
    • Profile hidden Markov models and metamorphic virus detection
    • Attaluri, S., McGhee, S., Stamp, M.: Profile hidden Markov models and metamorphic virus detection. J. Comput. Virol. 5(2), 151-169 (2009).
    • (2009) J. Comput. Virol. , vol.5 , Issue.2 , pp. 151-169
    • Attaluri, S.1    McGhee, S.2    Stamp, M.3
  • 6
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 30-40 (2008).
    • (2008) J. Comput. Virol. , vol.4 , Issue.3 , pp. 30-40
    • Borello, J.1    Me, L.2
  • 7
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the roc curve in the evaluation of machine learning algorithms
    • Bradley, A. P.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognit. 30, 1145-1159 (1997).
    • (1997) Pattern Recognit. , vol.30 , pp. 1145-1159
    • Bradley, A.P.1
  • 8
    • 84880587932 scopus 로고    scopus 로고
    • Cygwin, Cygwin Utility Files
    • Cygwin, Cygwin Utility Files, http://www. cygwin. com/.
  • 9
    • 78651067505 scopus 로고    scopus 로고
    • Master's report, Department of Computer Science, San Jose State University
    • Desai, P.: Towards an undetectable computer virus, Master's report, Department of Computer Science, San Jose State University (2008). http://scholarworks. sjsu. edu/etd_projects/90/.
    • (2008) Towards an undetectable computer virus
    • Desai, P.1
  • 10
    • 84880626011 scopus 로고    scopus 로고
    • Master's report, Department of Computer Science, San Jose State University
    • Deshpande, S.: Eigenvalue Analysis for Metamorphic Detection, Master's report, Department of Computer Science, San Jose State University (2012). http://scholarworks. sjsu. edu/etd_projects/279/.
    • (2012) Eigenvalue Analysis for Metamorphic Detection
    • Deshpande, S.1
  • 11
    • 84880630211 scopus 로고    scopus 로고
    • Efficient cryptanalysis of homophonic substitution ciphers
    • Dhavare, A., Low, R. M., Stamp, M.: Efficient cryptanalysis of homophonic substitution ciphers. to appear in Cryptologia.
    • Cryptologia
    • Dhavare, A.1    Low, R.M.2    Stamp, M.3
  • 12
    • 35348995283 scopus 로고    scopus 로고
    • Metamorphism, formal grammars and undecidable code mutation
    • Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Sci. 2, 70-75 (2007).
    • (2007) Int. J. Comput. Sci. , vol.2 , pp. 70-75
    • Filiol, E.1
  • 13
    • 56549084673 scopus 로고    scopus 로고
    • Technical report, Department of Computer Science, Purdue University
    • Idika, N., Mathur, A.: A Survey of Malware Detection Techniques, Technical report, Department of Computer Science, Purdue University (2007). http://www. serc. net/system/files/SERC-TR-286. pdf.
    • (2007) A Survey of Malware Detection Techniques
    • Idika, N.1    Mathur, A.2
  • 15
    • 34248350860 scopus 로고
    • A fast method for the cryptanalysis of substitution ciphers
    • Jakobsen, T.: A fast method for the cryptanalysis of substitution ciphers. Cryptologia 19, 265-274 (1995).
    • (1995) Cryptologia , vol.19 , pp. 265-274
    • Jakobsen, T.1
  • 16
    • 79960582590 scopus 로고    scopus 로고
    • Hunting for undetectable metamorphic viruses
    • Lin, D., Stamp, M.: Hunting for undetectable metamorphic viruses. J. Comput. Virol. 7(3), 201-214 (2011).
    • (2011) J. Comput. Virol. , vol.7 , Issue.3 , pp. 201-214
    • Lin, D.1    Stamp, M.2
  • 18
    • 84860607459 scopus 로고    scopus 로고
    • Master's report, Department of Computer Science, San Jose State University
    • Patel, M.: Similarity Tests for Metamorphic Virus Detection, Master's report, Department of Computer Science, San Jose State University, (2011). http://scholarworks. sjsu. edu/etd_projects/175/.
    • (2011) Similarity Tests for Metamorphic Virus Detection
    • Patel, M.1
  • 19
    • 82955239645 scopus 로고    scopus 로고
    • Evolution of computer virus concealment and anti-virus techniques: a short survey
    • Rad, B. B., Masrom, M., Ibrahim, S.: Evolution of computer virus concealment and anti-virus techniques: a short survey. IJCSI Int. J. Comput. Sci. Issues 8(1) (2011). http://arxiv. org/pdf/1104. 1070. pdf.
    • (2011) IJCSI Int. J. Comput. Sci. Issues , vol.8 , Issue.1
    • Rad, B.B.1    Masrom, M.2    Ibrahim, S.3
  • 20
    • 84860621757 scopus 로고    scopus 로고
    • Opcode graph similarity and metamorphic detection
    • Runwal, N., Low, R. M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1-2), 37-52 (2012).
    • (2012) J. Comput. Virol. , vol.8 , Issue.1-2 , pp. 37-52
    • Runwal, N.1    Low, R.M.2    Stamp, M.3
  • 21
    • 84880579283 scopus 로고    scopus 로고
    • Master's report, Department of Computer Science, San Jose State University
    • Shanmugam, G.: Simple Substitution Distance and Metamorphic Detection, Master's report, Department of Computer Science, San Jose State University (2012). http://scholarworks. sjsu. edu/etd_projects/270/.
    • (2012) Simple Substitution Distance and Metamorphic Detection
    • Shanmugam, G.1
  • 22
    • 84880634325 scopus 로고    scopus 로고
    • Snakebyte. Next Generation Virus Construction Kit (NGVCK)
    • Snakebyte. Next Generation Virus Construction Kit (NGVCK) (2000). http://vx. netlux. org/vx. php?id=tn02.
    • (2000)
  • 23
    • 80255131297 scopus 로고    scopus 로고
    • Comparing files using structural entropy
    • Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259-265 (2011).
    • (2011) J. Comput. Virol. , vol.7 , Issue.4 , pp. 259-265
    • Sorokin, I.1
  • 24
    • 84893005301 scopus 로고    scopus 로고
    • Metamorphic worm that carries its own morphing engine
    • to appear in
    • Sridhara, S. M., Stamp, M.: Metamorphic worm that carries its own morphing engine. to appear in J. Comput. Virol.
    • J. Comput. Virol.
    • Sridhara, S.M.1    Stamp, M.2
  • 28
    • 84880613106 scopus 로고    scopus 로고
    • Chi-squared distance and metamorphic virus detection
    • to appear in
    • Toderici, A. H., Stamp, M.: Chi-squared distance and metamorphic virus detection. to appear in J. Comput. Virol.
    • J. Comput. Virol.
    • Toderici, A.H.1    Stamp, M.2
  • 30
    • 33751208937 scopus 로고    scopus 로고
    • Hunting for metamorphic engines
    • Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211-229 (2006).
    • (2006) J. Comput. Virol. , vol.2 , Issue.3 , pp. 211-229
    • Wong, W.1    Stamp, M.2
  • 31
    • 70349989094 scopus 로고    scopus 로고
    • Code mutation techniques by means of formal grammars and automatons
    • Zbitskiy, P.: Code mutation techniques by means of formal grammars and automatons. J. Comput. Virol. 5(3), 199-207 (2009).
    • (2009) J. Comput. Virol. , vol.5 , Issue.3 , pp. 199-207
    • Zbitskiy, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.