-
1
-
-
85010853328
-
Using spatio-temporal information in API calls with machine learning algorithms for malware detection
-
Ahmed, F. et al: Using spatio-temporal information in API calls with machine learning algorithms for malware detection, ACM Workshop on Security and Artificial Intelligence (2009)
-
(2009)
ACM Workshop on Security and Artificial Intelligence
-
-
Ahmed, F.1
-
2
-
-
80255137449
-
Graph-based malware detection using dynamic analysis
-
Anderson, B., et al.: Graph-based malware detection using dynamic analysis. J. Comput. Virol. 7(4), 247–258 (2011)
-
(2011)
J. Comput. Virol.
, vol.7
, Issue.4
, pp. 247-258
-
-
Anderson, B.1
-
3
-
-
84941220421
-
Hidden Markov models for malware classification
-
Annachhatre, C., Austin, T.H., Stamp, M.: Hidden Markov models for malware classification. J. Comput. Virol. Hack. Tech. 11(2), 59–73 (2014)
-
(2014)
J. Comput. Virol. Hack. Tech.
, vol.11
, Issue.2
, pp. 59-73
-
-
Annachhatre, C.1
Austin, T.H.2
Stamp, M.3
-
4
-
-
67349123665
-
Profile Hidden Markov Models and metamorphic virus detection
-
Attaluri, S., McGhee, S., Stamp, M.: Profile Hidden Markov Models and metamorphic virus detection. J. Comput. Virol. 5(2), 151–169 (2009)
-
(2009)
J. Comput. Virol.
, vol.5
, Issue.2
, pp. 151-169
-
-
Attaluri, S.1
McGhee, S.2
Stamp, M.3
-
6
-
-
84893000796
-
Structural entropy and metamorphic malware
-
Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. Hack. Tech. 9(4), 179–192 (2013)
-
(2013)
J. Comput. Virol. Hack. Tech.
, vol.9
, Issue.4
, pp. 179-192
-
-
Baysa, D.1
Low, R.M.2
Stamp, M.3
-
7
-
-
48349087890
-
Code obfuscation techniques for metamorphic viruses
-
Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.3
, pp. 211-220
-
-
Borello, J.1
Me, L.2
-
8
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. J. Pattern Recogn. 30(7), 1145–1159 (1997)
-
(1997)
J. Pattern Recogn.
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
9
-
-
85010911434
-
-
Buster Sandbox Analyser. Accessed 20 Dec 2015
-
Buster Sandbox Analyser. http://bsa.isoftware.nl/. Accessed 20 Dec 2015
-
-
-
-
10
-
-
84874138160
-
-
Choi, Y.H. et al.: Toward extracting malware features for classification using static and dynamic analysis. Computing and Networking Technology (ICCNT), Gueongju, South Korea, pp. 126–129
-
Choi, Y.H. et al.: Toward extracting malware features for classification using static and dynamic analysis. Computing and Networking Technology (ICCNT), Gueongju, South Korea, pp. 126–129
-
-
-
-
11
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
Bellevue: WA
-
Christodorescu,M., Jha, S.: Static analysis of executables to detect malicious patterns. In: Proceeding of USENIX Security Symposium. Bellevue, WA, pp. 169–186. http://www.cs.cornell.edu/courses/cs711/2005fa/papers/cj-usenix03.pdf
-
Proceeding of USENIX Security Symposium
, pp. 169-186
-
-
-
12
-
-
77952602657
-
Efficient virus detection using dynamic instruction sequences
-
Dai, J., Guha, R., Lee, J.: Efficient virus detection using dynamic instruction sequences. J. Comput. 4(5), 405–414 (2009)
-
(2009)
J. Comput.
, vol.4
, Issue.5
, pp. 405-414
-
-
Dai, J.1
Guha, R.2
Lee, J.3
-
13
-
-
85010853306
-
Combining dynamic and static analysis for malware detection, Master’s report, Department of Computer Science
-
Damodaran, A.: Combining dynamic and static analysis for malware detection, Master’s report, Department of Computer Science, San Jose State University, 2015. http://scholarworks.sjsu.edu/etd_projects/391/
-
(2015)
San Jose State University
-
-
Damodaran, A.1
-
14
-
-
85010857763
-
-
Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves
-
Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves, http://www.autonlab.org/icml_documents/camera-ready/030_The_Relationship_Bet.pdf
-
-
-
-
15
-
-
85010848616
-
Metamorphic detection using function call graph analysis, Master’s report, Department of Computer Science
-
Deshpande, P.: Metamorphic detection using function call graph analysis, Master’s report, Department of Computer Science, San Jose State University, 2013, http://scholarworks.sjsu.edu/etd_projects/336/
-
(2013)
San Jose State University
-
-
Deshpande, P.1
-
16
-
-
84893826510
-
Eigenvalue analysis for metamorphic detection
-
Deshpande, S., Park, Y., Stamp, M.: Eigenvalue analysis for metamorphic detection. J. Comput. Virol. Hack. Techn. 10(1), 53–65 (2014)
-
(2014)
J. Comput. Virol. Hack. Techn.
, vol.10
, Issue.1
, pp. 53-65
-
-
Deshpande, S.1
Park, Y.2
Stamp, M.3
-
17
-
-
84874564513
-
-
Alexandria, Virginia
-
Dinaburg, A., Royal, P., Sharif, M. and Lee, W.: Ether: Malware analysis via hardware virtualization extensions, CCS 08, October 27–31, 2008, Alexandria, Virginia. http://ether.gtisc.gatech.edu/ether_ccs_2008.pdf
-
(2008)
Ether: Malware analysis via hardware virtualization extensions, CCS 08, October 27–31
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
18
-
-
84858392040
-
A survey on automated dynamic malware analysis techniques and tools
-
Egele, M., Scholte, T., Kirda, E. and Kruegel, C.: A survey on automated dynamic malware analysis techniques and tools. J. ACM Comput. Surv. 44(2):Article 6, (2012)
-
(2012)
J. ACM Comput. Surv. 44(2):Article
, pp. 6
-
-
Egele, M.1
Scholte, T.2
Kirda, E.3
Kruegel, C.4
-
19
-
-
84859034694
-
A graph mining approach for detecting unknown malwares
-
Eskandari, M., Hashemi, S.: A graph mining approach for detecting unknown malwares. J. Vis. Lang. Comput. 23(3), 154–162 (2012)
-
(2012)
J. Vis. Lang. Comput.
, vol.23
, Issue.3
, pp. 154-162
-
-
Eskandari, M.1
Hashemi, S.2
-
20
-
-
84876424144
-
HDM-Analyser: A hybrid analysis approach based on data mining techniques for malware detection
-
Eskandari, M., Khorshidpour, Z., Hashemi, S.: HDM-Analyser: A hybrid analysis approach based on data mining techniques for malware detection. J. Comput. Virol. Hack. Techn. 9(2), 77–93 (2013)
-
(2013)
J. Comput. Virol. Hack. Techn.
, vol.9
, Issue.2
, pp. 77-93
-
-
Eskandari, M.1
Khorshidpour, Z.2
Hashemi, S.3
-
21
-
-
84868579056
-
To incorporate sequential dynamic features in malware detection engines
-
Eskandari, M., Khorshidpur, Z. and Hashemi, S.: To incorporate sequential dynamic features in malware detection engines, Intelligence and Security Informatics Conference (EISIC), pp. 46–52 (2012)
-
(2012)
Intelligence and Security Informatics Conference (EISIC)
, pp. 46-52
-
-
Eskandari, M.1
Khorshidpur, Z.2
Hashemi, S.3
-
22
-
-
85010911398
-
-
Fawcett. T.: An introduction to ROC analysis
-
Fawcett. T.: An introduction to ROC analysis. http://people.inf.elte.hu/kiss/13dwhdm/roc.pdf
-
-
-
-
23
-
-
0035247059
-
An introduction to hidden Markov models and Bayesian networks
-
Ghahramani, Z.: An introduction to hidden Markov models and Bayesian networks. Int. J. Pattern Recognit. Artif. Intell. 15(1), 9–42 (2001)
-
(2001)
Int. J. Pattern Recognit. Artif. Intell.
, vol.15
, Issue.1
, pp. 9-42
-
-
Ghahramani, Z.1
-
24
-
-
85010912537
-
-
Harebot
-
Harebot.: http://www.pandasecurity.com/homeusers/security-info/220319/Harebot.M
-
-
-
-
25
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: From a survey towards an established taxonomy. J. Comput. Virol. 4(3), 251–266 (2008)
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.3
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
26
-
-
84945139460
-
Singular value decomposition and metamorphic detection
-
Jidigam, R.K., Austin, T.H., Stamp, M.: Singular value decomposition and metamorphic detection. J. Comput. Virol. Hack. Techn 11(4), 203–216 (2015)
-
(2015)
J. Comput. Virol. Hack. Techn
, vol.11
, Issue.4
, pp. 203-216
-
-
Jidigam, R.K.1
Austin, T.H.2
Stamp, M.3
-
27
-
-
85076206522
-
-
Kolbitsch, C. et al.: Effective and efficient malware detection at the end host. In: Proceedings of the 18th conference on USENIX security symposium, pp. 351–366. Montreal Canada
-
Kolbitsch, C. et al.: Effective and efficient malware detection at the end host. In: Proceedings of the 18th conference on USENIX security symposium, pp. 351–366. Montreal Canada. https://www.usenix.org/legacy/event/sec09/tech/full_papers/kolbitsch.pdf
-
-
-
-
28
-
-
84936742903
-
Compression-based analysis of metamorphic malware
-
Lee, J., Austin, T.H., Stamp, M.: Compression-based analysis of metamorphic malware. Int. J. Secur. Netw 10(2), 124–136 (2015)
-
(2015)
Int. J. Secur. Netw
, vol.10
, Issue.2
, pp. 124-136
-
-
Lee, J.1
Austin, T.H.2
Stamp, M.3
-
29
-
-
84881183138
-
Driving in the cloud: An analysis of drive-by download operations and abuse reporting, Proceedings of the 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Berlin, Germany
-
Nappa, A., Rafique, M.Z. and Caballero, J.: Driving in the cloud: An analysis of drive-by download operations and abuse reporting, Proceedings of the 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Berlin, Germany, July (2013)
-
(2013)
July
-
-
Nappa, A.1
Rafique, M.Z.2
Caballero, J.3
-
30
-
-
78349280003
-
Fast malware classification by automated behavioral graph matching
-
Park, Y., Reeves, D., Mulukutla, V. and Sundaravel, B.: Fast malware classification by automated behavioral graph matching. In: Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research (2010)
-
(2010)
Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research
-
-
Park, Y.1
Reeves, D.2
Mulukutla, V.3
Sundaravel, B.4
-
31
-
-
84888873413
-
Deriving common malware behavior through graph clustering
-
Park, Y., Reeves, D. and Stamp, M.: Deriving common malware behavior through graph clustering. Comput. Secur. 39(B):419–430 (2013)
-
(2013)
Comput. Secur
, vol.39
, Issue.B
, pp. 419-430
-
-
Park, Y.1
Reeves, D.2
Stamp, M.3
-
32
-
-
84893457491
-
Analyzing malware by abstracting the frequent itemsets in API call sequences, pp. 265–270. Trust
-
Qiao, Y., He, J., Yang, Y., Ji, L.: Analyzing malware by abstracting the frequent itemsets in API call sequences, pp. 265–270. Trust, Security and Privacy in Computing and Communications (TrustCom) (2013)
-
(2013)
Security and Privacy in Computing and Communications (TrustCom)
-
-
Qiao, Y.1
He, J.2
Yang, Y.3
Ji, L.4
-
33
-
-
78249234136
-
Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory. Recent Adv. Intrusion Detect. Lect. Notes Comput
-
Rhee, J., Riley, R., Xu, D., Jiang, X.: Kernel malware analysis with un-tampered and temporal views of dynamic kernel memory. Recent Adv. Intrusion Detect. Lect. Notes Comput. Sci. 6307, 178–197 (2010)
-
(2010)
Sci
, vol.6307
, pp. 178-197
-
-
Rhee, J.1
Riley, R.2
Xu, D.3
Jiang, X.4
-
34
-
-
0024610919
-
-
Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc IEEE 77(2):257–286 (1989)
-
Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc IEEE 77(2):257–286 (1989). http://www.cs.ubc.ca/~murphyk/Bayes/rabiner.pdf
-
-
-
-
35
-
-
84860621757
-
Opcode graph similarity and metamorphic detection
-
Runwal, N., Low, R.M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1–2), 37–52 (2012)
-
(2012)
J. Comput. Virol.
, vol.8
, Issue.1-2
, pp. 37-52
-
-
Runwal, N.1
Low, R.M.2
Stamp, M.3
-
36
-
-
85010861605
-
-
SandBoxie.
-
SandBoxie. http://sandboxie.com/
-
-
-
-
37
-
-
85010884156
-
-
Security Shield.
-
Security Shield. http://www.symantec.com/security_response/glossary/define.jsp?letter=s&word=security-shield
-
-
-
-
38
-
-
79955114244
-
Malware detection using assembly and API call sequences
-
Shankarapani, M.K., Ramamoorthy, S., Movva, R.S., Mukkamala, S.: Malware detection using assembly and API call sequences. J. Comput. Virol. 2(7), 107–119 (2011)
-
(2011)
J. Comput. Virol.
, vol.2
, Issue.7
, pp. 107-119
-
-
Shankarapani, M.K.1
Ramamoorthy, S.2
Movva, R.S.3
Mukkamala, S.4
-
39
-
-
84880591935
-
Simple substitution distance and metamorphic detection
-
Shanmugam, G., Low, R.M., Stamp, M.: Simple substitution distance and metamorphic detection. J. Comput. Virol. Hack. Techn. 9(3), 159–170 (2013)
-
(2013)
J. Comput. Virol. Hack. Techn.
, vol.9
, Issue.3
, pp. 159-170
-
-
Shanmugam, G.1
Low, R.M.2
Stamp, M.3
-
40
-
-
85010845285
-
Support Vector Machines and metamorphic malware detection, Master’s report, Department of Computer Science
-
Singh, T.: Support Vector Machines and metamorphic malware detection, Master’s report, Department of Computer Science, San Jose State University (2015). http://scholarworks.sjsu.edu/etd_projects/409/
-
(2015)
San Jose State University
-
-
Singh, T.1
-
41
-
-
85010849097
-
-
Smart HDD.
-
Smart HDD. http://support.kaspersky.com/viruses/rogue?qid=208286454
-
-
-
-
42
-
-
80255131297
-
Comparing files using structural entropy
-
Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259–265 (2011)
-
(2011)
J. Comput. Virol.
, vol.7
, Issue.4
, pp. 259-265
-
-
Sorokin, I.1
-
43
-
-
85010845957
-
-
Stamp, M.: A revealing introduction to hidden Markov models (2012)
-
Stamp, M.: A revealing introduction to hidden Markov models (2012). http://www.cs.sjsu.edu/~stamp/RUA/HMM.pdf
-
-
-
-
44
-
-
85010849094
-
Internet Security Report
-
Symantec White Paper, Internet Security Report, vol 20, (2015). http://www.symantec.com/security_response/publications/threatreport.jsp
-
(2015)
vol 20
-
-
-
45
-
-
84874559655
-
Chi-squared distance and metamorphic virus detection
-
Toderici, A.H., Stamp, M.: Chi-squared distance and metamorphic virus detection. J. Comput. Virol. Hack. Techn. 9(1), 1–14 (2013)
-
(2013)
J. Comput. Virol. Hack. Techn.
, vol.9
, Issue.1
, pp. 1-14
-
-
Toderici, A.H.1
Stamp, M.2
-
46
-
-
85010878414
-
-
Trojan.Zbot
-
Trojan.Zbot. http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99
-
-
-
-
47
-
-
85010838241
-
-
Trojan.ZeroAccess.
-
Trojan.ZeroAccess. http://www.symantec.com/security_response/writeup.jsp?docid=2011-071314-0410-99
-
-
-
-
48
-
-
85010878415
-
-
Win32/Winwebsec
-
Win32/Winwebsec. http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Win32%2fWinwebsec
-
-
-
-
49
-
-
33751208937
-
Hunting for metamorphic engines
-
Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211–229 (2006)
-
(2006)
J. Comput. Virol.
, vol.2
, Issue.3
, pp. 211-229
-
-
Wong, W.1
Stamp, M.2
-
50
-
-
54849412646
-
An intelligent PE-malware detection system based on association mining
-
Ye, Y., Wang, D., Li, T., Ye, D., Jiang, Q.: An intelligent PE-malware detection system based on association mining. J. Comput. Virol. 4(4), 323–334 (2008)
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.4
, pp. 323-334
-
-
Ye, Y.1
Wang, D.2
Li, T.3
Ye, D.4
Jiang, Q.5
|