Static Malware Analysis Using Machine Learning Methods

作者: Hiran V. Nath , Babu M. Mehtre

DOI: 10.1007/978-3-642-54525-2_39

关键词: Machine learningStatic analysisLeverage (negotiation)MalwareCyber defenseArtificial intelligenceMalware analysisComputer scienceCyber-attackAdvanced persistent threatZero-day attack

摘要: … In case of pdf documents even though its known that exploits could be written in Visual … This increases the risk associated with the PDF language based malware. Along with these, once …

参考文章(36)
Eric Filiol, Malicious cryptography techniques for unreversable (malicious or not) binaries arXiv: Cryptography and Security. ,(2010)
Georg T Becker, Francesco Regazzoni, Christof Paar, Wayne P Burleson, None, Stealthy Dopant-Level Hardware Trojans Cryptographic Hardware and Embedded Systems - CHES 2013. pp. 197- 214 ,(2013) , 10.1007/978-3-642-40349-1_12
Shun-Te Liu, Yi-Ming Chen, Hui-Ching Hung, N-Victims: An Approach to Determine N-Victims for APT Investigations workshop on information security applications. pp. 226- 240 ,(2012) , 10.1007/978-3-642-35416-8_16
Richard A. Raines, Thomas E. Dube, A novel malware target recognition architecture for enhanced cyberspace situation awareness Air Force Institute of Technology. ,(2011)
Shu-Chang Din, Bai-Jian Gao, Yi-Bin Lu, Chao-Fu Zheng, Using Multi-Feature and Classifier Ensembles to Improve Malware Detection ,(2010)
Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang, Malicious codes detection based on ensemble learning autonomic and trusted computing. pp. 468- 477 ,(2007) , 10.1007/978-3-540-73547-2_48
Steven K. Rogers, Richard A. Raines, Thomas E. Dube, Malware Target Recognition ,(2012)
Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne Burleson, Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering cryptographic hardware and embedded systems. ,vol. 5747, pp. 382- 395 ,(2009) , 10.1007/978-3-642-04138-9_27
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq, PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime recent advances in intrusion detection. pp. 121- 141 ,(2009) , 10.1007/978-3-642-04342-0_7