The Software Similarity Problem in Malware Analysis

作者: Andrew Walenstein , Arun Lakhotia

DOI:

关键词:

摘要: In software engineering contexts may be compared for similarity in order to detect duplicate code that indicates poor design, and reconstruct evolution history. Malicious software, being nothing other than a particular type of can also simi- larity commonalities This paper provides brief introduction the issue measuring between malicious programs, how is known occur area. It then uses this review try draw lines connect research (e.g., on "clone detection" ) problems anti- malware research.

参考文章(14)
Udi Manber, Brenda S. Baker, Deducing similarities in Java sources from bytecodes usenix annual technical conference. pp. 15- 15 ,(1998)
Rainer Koschke, Survey of Research on Software Clones dagstuhl seminar proceedings. pp. 0- ,(2007)
Thomas Lancaster, Fintan Culwin, A Comparison of Source Code Plagiarism Detection Engines Computer Science Education. ,vol. 14, pp. 101- 112 ,(2004) , 10.1080/08993400412331363843
Robert Lyda, James Hamrock, Exploring Investigative Methods for Identifying and Profiling Serial Bots Journal of Digital Forensic Practice. ,vol. 1, pp. 165- 177 ,(2006) , 10.1080/15567280600995782
Brenda S. Baker, Parameterized Duplication in Strings: Algorithms and an Application to Software Maintenance SIAM Journal on Computing. ,vol. 26, pp. 1343- 1362 ,(1997) , 10.1137/S0097539793246707
M.W. Godfrey, L. Zou, Using origin analysis to detect merging and splitting of source code entities IEEE Transactions on Software Engineering. ,vol. 31, pp. 166- 181 ,(2005) , 10.1109/TSE.2005.28
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia, Normalizing Metamorphic Malware Using Term Rewriting source code analysis and manipulation. pp. 75- 84 ,(2006) , 10.1109/SCAM.2006.20
T. Kamiya, S. Kusumoto, K. Inoue, CCFinder: a multilinguistic token-based code clone detection system for large scale source code IEEE Transactions on Software Engineering. ,vol. 28, pp. 654- 670 ,(2002) , 10.1109/TSE.2002.1019480
Md. Enamul. Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida, Malware Phylogeny Generation using Permutations of Code Journal in Computer Virology. ,vol. 1, pp. 13- 23 ,(2005) , 10.1007/S11416-005-0002-9