Memory access patterns for malware detection

作者: Andrii Shalaginov , Katrin Franke , Sergii Banin

DOI:

关键词:

摘要:

参考文章(10)
Matjaz Kukar, Igor Kononenko, Machine Learning and Data Mining: Introduction to Principles and Algorithms Horwood Publishing Limited. ,(2007)
Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu, API Chaser: Anti-analysis Resistant Malware Analyzer recent advances in intrusion detection. pp. 123- 143 ,(2013) , 10.1007/978-3-642-41284-4_7
Jun Yang, Jiangdong Deng, Baojiang Cui, Haifeng Jin, Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM innovative mobile and internet services in ubiquitous computing. pp. 296- 300 ,(2015) , 10.1109/IMIS.2015.47
Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel, A survey on automated dynamic malware-analysis techniques and tools ACM Computing Surveys. ,vol. 44, pp. 6- ,(2008) , 10.1145/2089125.2089126
Igor Santos, Felix Brezo, Xabier Ugarte-Pedrero, Pablo G Bringas, None, Opcode sequences as representation of executables for data-mining-based unknown malware detection Information Sciences. ,vol. 231, pp. 64- 82 ,(2013) , 10.1016/J.INS.2011.08.020
A Software Birthmark Based on Dynamic Opcode n-gram international conference on semantic computing. pp. 37- 44 ,(2007) , 10.1109/ICSC.2007.7
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon Giffin, Robust signatures for kernel data structures computer and communications security. pp. 566- 577 ,(2009) , 10.1145/1653662.1653730
Vinod P., V. Laxmi, M.S. Gaur, REFORM: Relevant Features for Malware Analysis 2012 26th International Conference on Advanced Information Networking and Applications Workshops. pp. 738- 744 ,(2012) , 10.1109/WAINA.2012.149
Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, Dmitry Ponomarev, Ensemble Learning for Low-Level Hardware-Supported Malware Detection recent advances in intrusion detection. pp. 3- 25 ,(2015) , 10.1007/978-3-319-26362-5_1