Wavelet decomposition of software entropy to identify malware

作者: Derek A. Soeder , Michael Wojnowicz , Glenn Chisholm , Matthew Wolff , Xuan Zhao

DOI:

关键词:

摘要: A plurality of data files is received. Thereafter, each file represented as an entropy time series that reflects amount across locations in code for such file. wavelet transform applied, file, to the corresponding generate energy spectrum characterizing, entropic at multiple scales resolution. It can then be determined, whether or not likely malicious based on spectrum. Related apparatus, systems, techniques and articles are also described.

参考文章(106)
Hajime Inoue, Stephanie Forrest, Anomaly detection in dynamic execution environments University of New Mexico. ,(2005)
Morgan C. Wang, Muazzam Siddiqui, Joohan Lee, Data mining methods for malware detection using instruction sequences international conference on artificial intelligence and applications. pp. 358- 363 ,(2008)
Galen Hunt, Shobana Balakrishnan, Robert Fries, Virtual machine snapshotting and analysis ,(2012)
Silvio Cesare, Yang Xiang, Classification of malware using structured control flow AusPDC '10 Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing - Volume 107. pp. 61- 70 ,(2010)
Walter Bogorad, Vadim Antonov, Carey Nachenberg, Zulfikar Ramzan, Ameet Zaveri, Using confidence about user intent in a reputation system ,(2009)
Dragomir Yankov, Rajesh Parekh, Abraham Bagherjeiran, Nicolas Eddy Mayoraz, Scoring clicks for click fraud prevention ,(2008)