메뉴 건너뛰기




Volumn , Issue , 2015, Pages 105-125

A Survey of Visualization Systems for Malware Analysis

Author keywords

[No Author keywords available]

Indexed keywords

DATA VISUALIZATION; SURVEYS; VISUALIZATION;

EID: 85123294947     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.2312/eurovisstar.20151114     Document Type: Conference Paper
Times cited : (97)

References (81)
  • 3
    • 0000974551 scopus 로고
    • Plots of high-dimensional data
    • ANDREWS D. F.: Plots of high-dimensional data. Biometrics 28, 1 (1972), 125-136. doi:10.2307/2528964. 11
    • (1972) Biometrics , vol.28 , Issue.1 , pp. 125-136
    • ANDREWS, D. F.1
  • 5
    • 85123313027 scopus 로고    scopus 로고
    • AUTOIT CONSULTING LTD.:. [online]. [cited 2014-12-29]. 5
    • AUTOIT CONSULTING LTD.:. Autoit [online]. 2014. URL: https://www.autoitscript.com/site/autoit/ [cited 2014-12-29]. 5
    • (2014) Autoit
  • 6
    • 85023621342 scopus 로고    scopus 로고
    • [online]. [cited 2014-12-29]. 5
    • BATRA R.:. API Monitor [online]. 2014. URL: http://www.rohitab.com/apimonitor [cited 2014-12-29]. 5
    • (2014) API Monitor
    • BATRA, R.1
  • 7
    • 80053510589 scopus 로고    scopus 로고
    • Surveying port scans and their detection methodologies
    • (Oct)
    • BHUYAN M. H., BHATTACHARYYA D., KALITA J.: Surveying port scans and their detection methodologies. The Computer Journal 54, 10 (Oct. 2011), 1565-1581. doi:10. 1093/comjnl/bxr035. 3
    • (2011) The Computer Journal , vol.54 , Issue.10 , pp. 1565-1581
    • BHUYAN, M. H.1    BHATTACHARYYA, D.2    KALITA, J.3
  • 8
    • 85063636742 scopus 로고    scopus 로고
    • QEMU, a fast and portable dynamic translator
    • ATEC USENIX Association, Berkeley, CA, USA, 3, 5
    • BELLARD F.: QEMU, a fast and portable dynamic translator. In Proc. USENIX Annual Technical Conf., ATEC (2005), USENIX Association, Berkeley, CA, USA, pp. 41-46. 3, 5
    • (2005) Proc. USENIX Annual Technical Conf , pp. 41-46
    • BELLARD, F.1
  • 14
    • 56449110617 scopus 로고    scopus 로고
    • Visual reverse engineering of binary and data files
    • Goodall J. R., Conti G., Ma K.-L., (Eds), LNCS 5210, Springer, 7, 8, 11, 12, 13, 14, 15, 16
    • CONTI G., DEAN E., SINDA M., SANGSTER B.: Visual reverse engineering of binary and data files. In Visualization for Computer Security, Proc. VizSec (2008), Goodall J. R., Conti G., Ma K.-L., (Eds.), LNCS 5210, Springer, pp. 1-17. doi:10.1007/978-3-540-85933-8_1. 7, 8, 11, 12, 13, 14, 15, 16
    • (2008) Visualization for Computer Security, Proc. VizSec , pp. 1-17
    • CONTI, G.1    DEAN, E.2    SINDA, M.3    SANGSTER, B.4
  • 15
    • 84949331034 scopus 로고
    • The use of faces to represent points in k-dimensional space graphically
    • CHERNOFF H.: The use of faces to represent points in k-dimensional space graphically. Journal of the American Statistical Association 68, 342 (1973), 361-368. doi:10.1080/01621459.1973.10482434. 11
    • (1973) Journal of the American Statistical Association , vol.68 , Issue.342 , pp. 361-368
    • CHERNOFF, H.1
  • 21
    • 84858392040 scopus 로고    scopus 로고
    • A survey on automated dynamic malware-analysis techniques and tools
    • EGELE M., SCHOLTE T., KIRDA E., KRUEGEL C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys 44, 2 (2012), 6:1-6:42. doi: 10.1145/2089125.2089126. 2, 3
    • (2012) ACM Computing Surveys , vol.44 , Issue.2 , pp. 6:1-6:42
    • EGELE, M.1    SCHOLTE, T.2    KIRDA, E.3    KRUEGEL, C.4
  • 24
    • 85123280566 scopus 로고    scopus 로고
    • FIREEYE INC.:. [online]. [cited 2014-12-29]. 5
    • FIREEYE INC.:. FireEye malware analysis [online]. 2014. URL: https://www.fireeye.com/products/malware-analysis.html [cited 2014-12-29]. 5
    • (2014) FireEye malware analysis
  • 27
    • 84926427148 scopus 로고
    • Survey of virtual machine research
    • 3
    • GOLDBERG R. P.: Survey of virtual machine research. Computer 7, 6 (1974), 34-45. 3
    • (1974) Computer , vol.7 , Issue.6 , pp. 34-45
    • GOLDBERG, R. P.1
  • 29
    • 84982844941 scopus 로고    scopus 로고
    • SEEM: A scalable visualization for comparing multiple large sets of attributes for malware analysis
    • ACM. 7, 8, 9, 11, 12, 13, 14, 15, 16
    • GOVE R., SAXE J., GOLD S., LONG A., BERGAMO G.: SEEM: A scalable visualization for comparing multiple large sets of attributes for malware analysis. In Proc. 11th Workshop on Visualization for Cyber Security, VizSec (2014), ACM. doi: 10.1145/2671491.2671496. 7, 8, 9, 11, 12, 13, 14, 15, 16
    • (2014) Proc. 11th Workshop on Visualization for Cyber Security, VizSec
    • GOVE, R.1    SAXE, J.2    GOLD, S.3    LONG, A.4    BERGAMO, G.5
  • 30
    • 84929049043 scopus 로고    scopus 로고
    • Malware analysis using visualized image matrices
    • 6, 7, 10, 11, 12, 13, 14, 15, 16
    • HAN K., KANG B., IM E. G.: Malware analysis using visualized image matrices. The Scientific World Journal 2014 (2014), 15. doi:10.1155/2014/132713. 6, 7, 10, 11, 12, 13, 14, 15, 16
    • (2014) The Scientific World Journal , vol.2014 , pp. 15
    • HAN, K.1    KANG, B.2    IM, E. G.3
  • 31
    • 84891431181 scopus 로고    scopus 로고
    • Malware analysis method using visualization of binary files
    • 6, 7, 10, 11, 12, 13, 14, 15, 16
    • HAN K., LIM J. H., IM E. G.: Malware analysis method using visualization of binary files. In Proc. Research in Adaptive and Convergent Systems, RACS (2013), pp. 317-321. doi:10. 1145/2513228.2513294. 6, 7, 10, 11, 12, 13, 14, 15, 16
    • (2013) Proc. Research in Adaptive and Convergent Systems, RACS , pp. 317-321
    • HAN, K.1    LIM, J. H.2    IM, E. G.3
  • 32
    • 84910010286 scopus 로고    scopus 로고
    • Malware analysis using visualized images and entropy graphs
    • 6, 7, 9, 11, 12, 13, 14, 15, 16
    • HAN K. S., LIM J. H., KANG B., IM E. G.: Malware analysis using visualized images and entropy graphs. Int. Journal of Information Security (2014), 1-14. doi:10.1007/s10207-014-0242-0. 6, 7, 9, 11, 12, 13, 14, 15, 16
    • (2014) Int. Journal of Information Security , pp. 1-14
    • HAN, K. S.1    LIM, J. H.2    KANG, B.3    IM, E. G.4
  • 34
  • 35
    • 85123287317 scopus 로고    scopus 로고
    • [online]. [cited 2014-12-29]. 5
    • JOE SECURITY LLC:. JoeSandbox [online]. 2014. URL: http://www.joesecurity.org [cited 2014-12-29]. 5
    • (2014) JoeSandbox
  • 36
    • 0036264672 scopus 로고    scopus 로고
    • Information visualization and visual data mining
    • 10, 11, 12
    • KEIM D.: Information visualization and visual data mining. IEEE Transactions on Visualization and Computer Graphics 8, 1 (2002), 1-8. doi:10.1109/2945.981847. 10, 11, 12
    • (2002) IEEE Transactions on Visualization and Computer Graphics , vol.8 , Issue.1 , pp. 1-8
    • KEIM, D.1
  • 37
    • 79952949331 scopus 로고    scopus 로고
    • Mastering the information age: solving problems with visual analytics
    • (Eds)
    • KEIM D., KOHLHAMMER J., ELLIS G., MANSMANN F. (Eds.): Mastering the information age: solving problems with visual analytics. Eurographics Association, 2010. 1, 17
    • (2010) Eurographics Association , vol.1 , pp. 17
    • KEIM, D.1    KOHLHAMMER, J.2    ELLIS, G.3    MANSMANN, F.4
  • 40
    • 50249164320 scopus 로고    scopus 로고
    • Visual Analytics: Scope and challenges
    • Simoff S. J., Böhlen M. H., Mazeika A., (Eds), LNCS 4404. Springer, Berlin
    • KEIM D. A., MANSMANN F., SCHNEIDEWIND J., THOMAS J., ZIEGLER H.: Visual Analytics: Scope and challenges. In Visual Data Mining, Simoff S. J., Böhlen M. H., Mazeika A., (Eds.), LNCS 4404. Springer, Berlin, 2008, pp. 76-90. doi:10.1007/978-3-540-71080-6_6. 14
    • (2008) Visual Data Mining , pp. 76-90
    • KEIM, D. A.1    MANSMANN, F.2    SCHNEIDEWIND, J.3    THOMAS, J.4    ZIEGLER, H.5
  • 41
    • 84957802402 scopus 로고    scopus 로고
    • [online]. [cited 2014-12-29]. 3
    • LINUX FOUNDATION:. Xen project [online]. 2014. URL: http://www.xenproject.org [cited 2014-12-29]. 3
    • (2014) Xen project
  • 42
    • 33749065750 scopus 로고    scopus 로고
    • Exploring highly structured data: a comparative study of stardinates and parallel coordinates
    • LANZENBERGER M., MIKSCH S., POHL M.: Exploring highly structured data: a comparative study of stardinates and parallel coordinates. In Proc. Int. Conf. Information Visualisation (2005), pp. 312-320. doi:10.1109/IV.2005.49. 11
    • (2005) Proc. Int. Conf. Information Visualisation , pp. 312-320
    • LANZENBERGER, M.1    MIKSCH, S.2    POHL, M.3
  • 46
    • 84889811840 scopus 로고    scopus 로고
    • A matter of time: Applying a data-users-tasks design triangle to visual analytics of time-oriented data
    • MIKSCH S., AIGNER W.: A matter of time: Applying a data-users-tasks design triangle to visual analytics of time-oriented data. Computers & Graphics 38 (2014), 286-290. doi:10.1016/j.cag.2013.11.002. 17
    • (2014) Computers & Graphics , vol.38 , pp. 286-290
    • MIKSCH, S.1    AIGNER, W.2
  • 52
    • 85123297400 scopus 로고    scopus 로고
    • [online]. [cited 2014-12-29]. 3
    • ORACLE CORPORATION:. Oracle VirtualBox [online]. 2014. URL: https://www.virtualbox.org [cited 2014-12-29]. 3
    • (2014) Oracle VirtualBox
  • 53
    • 63149084618 scopus 로고    scopus 로고
    • Signature visualization of software binaries
    • 7, 9, 11, 12, 13, 14, 15, 16
    • PANAS T.: Signature visualization of software binaries. In Proc. 4th ACM Symp. Software Visualization, SoftVis (2008), pp. 185-188. doi:10.1145/1409720.1409749. 6, 7, 9, 11, 12, 13, 14, 15, 16
    • (2008) Proc. 4th ACM Symp. Software Visualization, SoftVis , pp. 185-188
    • PANAS, T.1
  • 55
    • 84883273437 scopus 로고    scopus 로고
    • Mobile malware visual analytics and similarities of attack toolkits (malware gene analysis)
    • 7, 10, 11, 12, 13, 14, 15, 16
    • PATURI A., CHERUKURI M., DONAHUE J., MUKKAMALA S.: Mobile malware visual analytics and similarities of attack toolkits (malware gene analysis). In Proc. Int. Conf. Collaboration Technologies and Systems, CTS (2013), pp. 149-154. doi:10.1109/CTS.2013.6567221. 7, 10, 11, 12, 13, 14, 15, 16
    • (2013) Proc. Int. Conf. Collaboration Technologies and Systems, CTS , pp. 149-154
    • PATURI, A.1    CHERUKURI, M.2    DONAHUE, J.3    MUKKAMALA, S.4
  • 58
    • 80054806009 scopus 로고    scopus 로고
    • Reversing compiled executables for malware analysis via visualization
    • 7, 8, 11, 12, 13, 14, 15, 16
    • QUIST D. A., LIEBROCK L. M.: Reversing compiled executables for malware analysis via visualization. Information Visualization 10, 2 (2011), 117-126. doi:10.1057/ivs. 2010.11. 6, 7, 8, 11, 12, 13, 14, 15, 16
    • (2011) Information Visualization , vol.10 , Issue.2 , pp. 117-126
    • QUIST, D. A.1    LIEBROCK, L. M.2
  • 59
    • 85123288436 scopus 로고    scopus 로고
    • [online]. [cited 2014-12-29]. 5
    • RUSSINOVICH M., COGSWELL B.:. Process monitor v3.1 [online]. 2014. URL: http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx [cited 2014-12-29]. 5
    • (2014) Process monitor v3.1
    • RUSSINOVICH, M.1    COGSWELL, B.2
  • 60
    • 85123298923 scopus 로고    scopus 로고
    • [online]. [cited 2015-04-07]. 6
    • [online]. 2015. URL: https://www.zotero.org/support/dev/web_api/v3/basics [cited 2015-04-07]. 6
    • (2015)
  • 63
    • 0029725135 scopus 로고    scopus 로고
    • The eyes have it: a task by data type taxonomy for information visualizations
    • 14, 17
    • SHNEIDERMAN B.: The eyes have it: a task by data type taxonomy for information visualizations. In Proc. IEEE Symp. Visual Languages (1996), pp. 336-343. doi:10.1109/VL. 1996.545307. 14, 17
    • (1996) Proc. IEEE Symp. Visual Languages , pp. 336-343
    • SHNEIDERMAN, B.1
  • 64
    • 84922817764 scopus 로고    scopus 로고
    • Malware behavior image for malware variant identification
    • 6, 7, 9, 11, 12, 13, 14, 15, 16
    • SHAID S., MAAROF M.: Malware behavior image for malware variant identification. In Proc. 2014 Int. Symp. on Biometrics and Security Technologies, ISBAST (2014), pp. 238-243. doi:10.1109/ISBAST.2014.7013128. 6, 7, 9, 11, 12, 13, 14, 15, 16
    • (2014) Proc. 2014 Int. Symp. on Biometrics and Security Technologies, ISBAST , pp. 238-243
    • SHAID, S.1    MAAROF, M.2
  • 65
    • 84907284118 scopus 로고    scopus 로고
    • Malware behaviour visualization
    • 7, 9, 11, 12, 13, 14, 15, 16
    • SHAID, S.Z.M., MAAROF, M.A.: Malware behaviour visualization. Jurnal Teknologi 70, 5 (2014), 25-33. doi:10. 11113/jt.v70.3512. 6, 7, 9, 11, 12, 13, 14, 15, 16
    • (2014) Jurnal Teknologi , vol.70 , Issue.5 , pp. 25-33
    • SHAID, S.Z.M.1    MAAROF, M.A.2
  • 66
    • 84869049724 scopus 로고    scopus 로고
    • Visualization of shared system call sequence relationships in large malware corpora
    • ACM, 8, 11, 12, 13, 14, 15, 16, 17
    • SAXE J., MENTIS D., GREAMO C.: Visualization of shared system call sequence relationships in large malware corpora. In Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec (2012), ACM, pp. 33-40. doi:10.1145/2379690. 2379695. 7, 8, 11, 12, 13, 14, 15, 16, 17
    • (2012) Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec , pp. 33-40
    • SAXE, J.1    MENTIS, D.2    GREAMO, C.3
  • 70
    • 73049094155 scopus 로고    scopus 로고
    • A survey of data mining techniques for malware detection using file features
    • ACM-SE 46
    • SIDDIQUI M., WANG M. C., LEE J.: A survey of data mining techniques for malware detection using file features. In Proc. 46th Ann. Southeast Regional Conference on XX (2008), ACM-SE 46, pp. 509-510. doi:10.1145/1593105.1593239. 2
    • (2008) Proc. 46th Ann. Southeast Regional Conference on XX , pp. 509-510
    • SIDDIQUI, M.1    WANG, M. C.2    LEE, J.3
  • 71
    • 34948892521 scopus 로고    scopus 로고
    • Illuminating the Path: The Research and Development Agenda for Visual Analytics
    • (Eds): 1, 2, 14, 17
    • THOMAS J. J., COOK K. A. (Eds.): Illuminating the Path: The Research and Development Agenda for Visual Analytics. IEEE, 2005. 1, 2, 14, 17
    • (2005) IEEE
    • THOMAS, J. J.1    COOK, K. A.2
  • 73
    • 84946024598 scopus 로고    scopus 로고
    • VMWARE INC.:. [online]. [cited 2014-12-29]. 3
    • VMWARE INC.:. Vmware workstation [online]. 2014. URL: http://www.vmware.com/products/workstation/features.html [cited 2014-12-29]. 3
    • (2014) Vmware workstation
  • 75
    • 0031144006 scopus 로고    scopus 로고
    • Why interaction is more powerful than algorithms
    • WEGNER P.: Why interaction is more powerful than algorithms. Communications of the ACM 40, 5 (1997), 80-91. doi:10.1145/253769.253801. 2
    • (1997) Communications of the ACM , vol.40 , Issue.5 , pp. 80-91
    • WEGNER, P.1
  • 76
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using CWSandbox
    • WILLEMS C., HOLZ T., FREILING F.: Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy 5, 2 (2007), 32-39. doi:10.1109/MSP. 2007.45. 5
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • WILLEMS, C.1    HOLZ, T.2    FREILING, F.3
  • 78
    • 84875646496 scopus 로고    scopus 로고
    • Experiments with malware visualization
    • Flegel U., Markatos E., Robertson W., (Eds), LNCS 7591, Springer, 9, 11, 12, 13, 14, 15, 16
    • WU Y., YAP R. H. C.: Experiments with malware visualization. In Proc. 9th Int. Conf. Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA (2013), Flegel U., Markatos E., Robertson W., (Eds.), LNCS 7591, Springer, pp. 123-133. doi:10.1007/978-3-642-37300-8_7. 7, 9, 11, 12, 13, 14, 15, 16
    • (2013) Proc. 9th Int. Conf. Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA , pp. 123-133
    • WU, Y.1    YAP, R. H. C.2
  • 80
    • 20444452578 scopus 로고    scopus 로고
    • Visualizing windows executable viruses using self-organizing maps
    • (New York, NY, USA), ACM, 10, 11, 12, 13, 14, 15, 16
    • YOO I.: Visualizing windows executable viruses using self-organizing maps. In Proc. ACM Workshop on Visualization and Data Mining for Computer Security, VizSec (New York, NY, USA, 2004), ACM, pp. 82-89. doi:10.1145/1029208. 1029222. 7, 10, 11, 12, 13, 14, 15, 16
    • (2004) Proc. ACM Workshop on Visualization and Data Mining for Computer Security, VizSec , pp. 82-89
    • YOO, I.1
  • 81
    • 84869061486 scopus 로고    scopus 로고
    • MalwareVis: Entity-based visualization of malware network traces
    • ACM, 7, 8, 11, 12, 13, 14, 15, 16
    • ZHUO W., NADJIN Y.: MalwareVis: Entity-based visualization of malware network traces. In Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec (2012), ACM, pp. 41-47. doi:10.1145/2379690.2379696. 7, 8, 11, 12, 13, 14, 15, 16
    • (2012) Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec , pp. 41-47
    • ZHUO, W.1    NADJIN, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.