Mining Malware to Detect Variants

作者: Ahmad Azab , Robert Layton , Mamoun Alazab , Jonathan Oliver , None

DOI: 10.1109/CTC.2014.11

关键词:

摘要: … Our results show that TLSH and SDHASH provide the highest … the recently proposed TLSH algorithm with previously … We find that TLSH is efficient ingrouping different binaries to …

参考文章(30)
Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters, Moutaz Alazab, Information Security Governance IT Security Governance Innovations. pp. 293- 315 ,(2013) , 10.4018/978-1-4666-2083-4.CH011
K. M. A. Alzarooni, Malware variant detection Doctoral thesis, UCL (University College London).. ,(2012)
Stefano Paraboschi, Sabrina De Capitani di Vimercati, Pierangela Samarati, Ernesto Damiani, An Open Digest-based Technique for Spam Detection. iasted international conference on parallel and distributed computing and systems. pp. 559- 564 ,(2004)
Peter N Grabosky, Russell G Smith, Paul Wright, Crime in the Digital Age Routledge. ,(1998) , 10.4324/9780203794401
Peter N. Grabosky, Roderic G. Broadhurst, Cyber-Crime: The Challenge in Asia Hong Kong University Press. ,(2005)
A.H. Sung, J. Xu, P. Chavez, S. Mukkamala, Static analyzer of vicious executables (SAVE) annual computer security applications conference. pp. 326- 334 ,(2004) , 10.1109/CSAC.2004.37
Vassil Roussev, Data Fingerprinting with Similarity Digests international conference on digital forensics. pp. 207- 226 ,(2010) , 10.1007/978-3-642-15506-2_15
J.-Y. Xu, A.H. Sung, P. Chavez, S. Mukkamala, Polymorphic malicious executable scanner by API sequence analysis international conference hybrid intelligent systems. pp. 378- 383 ,(2004) , 10.1109/ICHIS.2004.75
M. Shankarapani, K. Kancherla, S. Ramammoorthy, R. Movva, S. Mukkamala, Kernel machines for malware classification and similarity analysis international joint conference on neural network. pp. 1- 6 ,(2010) , 10.1109/IJCNN.2010.5596339
Dennis Andriesse, Christian Rossow, Brett Stone-Gross, Daniel Plohmann, Herbert Bos, Highly resilient peer-to-peer botnets are here: An analysis of Gameover Zeus international conference on malicious and unwanted software. pp. 116- 123 ,(2013) , 10.1109/MALWARE.2013.6703693