메뉴 건너뛰기




Volumn 11, Issue 4, 2015, Pages 203-216

Singular value decomposition and metamorphic detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; EIGENVALUES AND EIGENFUNCTIONS; FACE RECOGNITION; MALWARE; PRINCIPAL COMPONENT ANALYSIS; STATIC ANALYSIS;

EID: 84945139460     PISSN: 22742042     EISSN: 22638733     Source Type: Journal    
DOI: 10.1007/s11416-014-0220-0     Document Type: Article
Times cited : (27)

References (36)
  • 1
    • 34249665980 scopus 로고
    • Diagonalization of matrices
    • Academic Press, New York
    • Arfken, G.: Diagonalization of matrices. In: Mathematical Methods for Physicists, 3rd edn, pp. 217–229. Academic Press, New York (1985)
    • (1985) Mathematical Methods for Physicists, 3rd edn , pp. 217-229
    • Arfken, G.1
  • 2
    • 84945152586 scopus 로고    scopus 로고
    • Wikipedia: Singular value decomposition. (2014). Accessed 19 July 2014
    • Wikipedia: Singular value decomposition. http://en.wikipedia.org/wiki/Singular_value_decomposition (2014). Accessed 19 July 2014
  • 3
    • 84945152587 scopus 로고    scopus 로고
    • Austin, D.: We recommend a singular value decomposition. Accessed 19 Jul 2014
    • Austin, D.: We recommend a singular value decomposition. http://www.ams.org/samplings/feature-column/fcarc-svd. Accessed 19 Jul 2014
  • 6
    • 84893000796 scopus 로고    scopus 로고
    • Structural entropy and metamorphic malware
    • Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. 9(4), 179–192 (2013)
    • (2013) J. Comput. Virol. , vol.9 , Issue.4 , pp. 179-192
    • Baysa, D.1    Low, R.M.2    Stamp, M.3
  • 7
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)
    • (2008) J. Comput. Virol. , vol.4 , Issue.3 , pp. 211-220
    • Borello, J.1    Me, L.2
  • 8
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recogn. 30, 1145–1159 (1997)
    • (1997) Pattern Recogn. , vol.30 , pp. 1145-1159
    • Bradley, A.P.1
  • 10
    • 80052787875 scopus 로고    scopus 로고
    • A malware detection framework based on Kolmogorov complexity
    • Deng, W., et al.: A malware detection framework based on Kolmogorov complexity. J. Computat. Inf. Syst. 7(8):2687–2694 (2011). http://www.jofcis.com/publishedpapers/2011_7_8_2687_2694.pdf
    • (2011) J. Computat. Inf. Syst , vol.7 , Issue.8 , pp. 2687-2694
    • Deng, W.1
  • 12
    • 35348995283 scopus 로고    scopus 로고
    • Metamorphism, formal grammars and undecidable code mutation
    • Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Sci. 2, 70–75 (2007)
    • (2007) Int. J. Comput. Sci. , vol.2 , pp. 70-75
    • Filiol, E.1
  • 13
    • 84945152590 scopus 로고    scopus 로고
    • Hsu, C., Chen, C.: SVD-based projection for face recognition. Accessed 19 July 2014
    • Hsu, C., Chen, C.: SVD-based projection for face recognition. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4374514. Accessed 19 July 2014
  • 14
    • 84945152591 scopus 로고    scopus 로고
    • JAMA. Java matrix package. Accessed 19 July 2014
    • JAMA. Java matrix package http://math.nist.gov/javanumerics/jama/. Accessed 19 July 2014
  • 17
    • 84945152592 scopus 로고    scopus 로고
    • Mean vector and covariance matrix, NIST. Accessed 19 July 2014
    • Mean vector and covariance matrix, NIST. http://www.itl.nist.gov/div898/handbook/pmc/section5/pmc541.htm. Accessed 19 July 2014
  • 18
    • 84945152593 scopus 로고    scopus 로고
    • The Mental Driller, Metamorphism in practice or “How I made MetaPHOR and what I’ve learnt” (2002).
    • The Mental Driller, Metamorphism in practice or “How I made MetaPHOR and what I’ve learnt” (2002). http://vxheavens.com/lib/vmd01.html
  • 19
    • 33845703344 scopus 로고    scopus 로고
    • What is a support vector machine
    • Noble, W.S.: What is a support vector machine? Nat. Biotechnol. 24(12), 1565–1567 (2006). http://marriottschool.net/teacher/IS555/Other/SVM_Readings.pdf
    • (2006) Nat. Biotechnol , vol.24 , Issue.12 , pp. 1565-1567
    • Noble, W.S.1
  • 20
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 21
    • 84860621757 scopus 로고    scopus 로고
    • Opcode graph similarity and metamorphic detection
    • Runwal, N., Low, R.M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1–2), 37–52 (2012)
    • (2012) J. Comput. Virol , vol.8 , Issue.1-2 , pp. 37-52
    • Runwal, N.1    Low, R.M.2    Stamp, M.3
  • 22
    • 82055176044 scopus 로고    scopus 로고
    • Eigenviruses for metamorphic virus recognition
    • Saleh, M., Mohamed, A., Nabi, A.: Eigenviruses for metamorphic virus recognition. IET Inf. Secur. 5(4), 191–198 (2011)
    • (2011) IET Inf. Secur. , vol.5 , Issue.4 , pp. 191-198
    • Saleh, M.1    Mohamed, A.2    Nabi, A.3
  • 23
    • 84945152594 scopus 로고    scopus 로고
    • Shlens, J.: A tutorial on principal component analysis. Accessed 19 July 2014
    • Shlens, J.: A tutorial on principal component analysis. http://www.cs.cmu.edu/~elaw/papers/pca.pdf. Accessed 19 July 2014
  • 24
    • 84880591935 scopus 로고    scopus 로고
    • Simple substitution distance and metamorphic detection
    • Shanmugam, G., Low, R.M., Stamp, M.: Simple substitution distance and metamorphic detection. J. Comput. Virol. Hack. Tech. 9(3), 159–170 (2013)
    • (2013) J. Comput. Virol. Hack. Tech. , vol.9 , Issue.3 , pp. 159-170
    • Shanmugam, G.1    Low, R.M.2    Stamp, M.3
  • 25
    • 84945152595 scopus 로고    scopus 로고
    • Singular value decomposition, Wolfram MathWorld. Accessed 19 July 2014
    • Singular value decomposition, Wolfram MathWorld. http://mathworld.wolfram.com/SingularValueDecomposition.html. Accessed 19 July 2014
  • 26
    • 80255131297 scopus 로고    scopus 로고
    • Comparing files using structural entropy
    • Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259–265 (2011)
    • (2011) J. Comput. Virol. , vol.7 , Issue.4 , pp. 259-265
    • Sorokin, I.1
  • 27
    • 84876448803 scopus 로고    scopus 로고
    • Metamorphic worm that carries its own morphing engine
    • Sridhara, S., Stamp, M.: Metamorphic worm that carries its own morphing engine. J. Comput. Virol. 9(2), 49–58 (2013)
    • (2013) J. Comput. Virol. , vol.9 , Issue.2 , pp. 49-58
    • Sridhara, S.1    Stamp, M.2
  • 28
    • 84945152596 scopus 로고    scopus 로고
    • Stamp, M.: A revealing introduction to hidden Markov models (2012).
    • Stamp, M.: A revealing introduction to hidden Markov models (2012). http://www.cs.sjsu.edu/stamp/RUA/HMM.pdf
  • 29
    • 84874559655 scopus 로고    scopus 로고
    • Chi-squared distance and metamorphic virus detection
    • Toderici, A.H., Stamp, M.: Chi-squared distance and metamorphic virus detection. J. Comput. Virol. Hack. Tech. 9(1), 1–14 (2013)
    • (2013) J. Comput. Virol. Hack. Tech. , vol.9 , Issue.1 , pp. 1-14
    • Toderici, A.H.1    Stamp, M.2
  • 30
    • 0026065565 scopus 로고    scopus 로고
    • Eigenfaces for recognition
    • Turk, M.A., Pentland, A.P.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71–86 (2007)
    • (2007) J. Cogn. Neurosci. , vol.3 , Issue.1 , pp. 71-86
    • Turk, M.A.1    Pentland, A.P.2
  • 31
    • 84945152597 scopus 로고    scopus 로고
    • Virus Profile: W32/NGVCK, McAfee Inc. Accessed 19 July 2014
    • Virus Profile: W32/NGVCK, McAfee Inc. http://home.mcafee.com/virusinfo/virusprofile.aspx?key=1090050. Accessed 19 July 2014
  • 32
    • 33751208937 scopus 로고    scopus 로고
    • Hunting for metamorphic engines
    • Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211–229 (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.3 , pp. 211-229
    • Wong, W.1    Stamp, M.2
  • 34
    • 70349989094 scopus 로고    scopus 로고
    • Code mutation techniques by means of formal grammars and automatons
    • Zbitskiy, P.: Code mutation techniques by means of formal grammars and automatons. J. Comput. Virol. 5(3), 199–207 (2009)
    • (2009) J. Comput. Virol. , vol.5 , Issue.3 , pp. 199-207
    • Zbitskiy, P.1
  • 36
    • 8644268199 scopus 로고    scopus 로고
    • Some further theoretical results about computer viruses
    • Zuo, Z., Zhou, M.: Some further theoretical results about computer viruses. Comput. J. 47(6), 627–633 (2004)
    • (2004) Comput. J. , vol.47 , Issue.6 , pp. 627-633
    • Zuo, Z.1    Zhou, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.