Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis

作者: Yuping Li , Jiyong Jang , Xinming Ou

DOI: 10.1007/978-3-030-37228-6_14

关键词: Control flow graphHash functionTheoretical computer scienceSecurity analysisMalware analysisComputer scienceGraph (abstract data type)Fuzzy logicCluster analysisMalware

摘要: … representative graph features, which could result in a universal and compact graph format … concept is applicable to represent CFGs to assess graph similarity, we design a blended n-…

参考文章(43)
Jiang Ming, Meng Pan, Debin Gao, iBinHunt: binary hunting with inter-procedural control flow international conference on information security and cryptology. ,vol. 7839, pp. 92- 109 ,(2012) , 10.1007/978-3-642-37682-5_8
Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici, Unknown Malcode Detection Using OPCODE Representation european conference on intelligence and security informatics. pp. 204- 215 ,(2008) , 10.1007/978-3-540-89900-6_21
M. Zubair Rafique, Juan Caballero, FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors recent advances in intrusion detection. pp. 144- 163 ,(2013) , 10.1007/978-3-642-41284-4_8
Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh, A Study of the Packer Problem and Its Solutions recent advances in intrusion detection. pp. 98- 115 ,(2008) , 10.1007/978-3-540-87403-4_6
Oleg Sokolsky, Sampath Kannan, Insup Lee, Simulation-Based graph similarity tools and algorithms for construction and analysis of systems. pp. 426- 440 ,(2006) , 10.1007/11691372_28
Debin Gao, Michael K. Reiter, Dawn Song, BinHunt: Automatically Finding Semantic Differences in Binary Programs international conference on information and communication security. pp. 238- 255 ,(2008) , 10.1007/978-3-540-88625-9_16
Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz, Automatic analysis of malware behavior using machine learning Journal of Computer Security. ,vol. 19, pp. 639- 668 ,(2011) , 10.3233/JCS-2010-0410
Gerardo Canfora, Andrea De Lorenzo, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio, Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware availability, reliability and security. pp. 333- 340 ,(2015) , 10.1109/ARES.2015.57
James J. McGregor, Backtrack search algorithms and the maximal common subgraph problem Software: Practice and Experience. ,vol. 12, pp. 23- 34 ,(1982) , 10.1002/SPE.4380120103
Martial Bourquin, Andy King, Edward Robbins, BinSlayer: accurate comparison of binary executables Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop. pp. 4- ,(2013) , 10.1145/2430553.2430557