Classification of malicious process using high‐level activity based dynamic analysis

作者: Deepti Vidyarthi , Gaurav Damri , Subrata Rakshit , C. R. Suthikshn Kumar , Shailesh Chansarkar

DOI: 10.1002/SPY2.86

关键词:

摘要:

参考文章(24)
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov, Learning and Classification of Malware Behavior international conference on detection of intrusions and malware and vulnerability assessment. pp. 108- 125 ,(2008) , 10.1007/978-3-540-70542-0_6
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Kyoung Soo Han, Boojoong Kang, Eul Gyu Im, Malware classification using instruction frequencies research in applied computation symposium. pp. 298- 300 ,(2011) , 10.1145/2103380.2103441
Aziz Mohaisen, Omar Alrawi, Manar Mohaisen, None, AMAL: High-fidelity, behavior-based automated malware analysis and classification Computers & Security. ,vol. 52, pp. 251- 266 ,(2015) , 10.1016/J.COSE.2015.04.001
Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, Saumya Debray, A semantics-based approach to malware detection symposium on principles of programming languages. ,vol. 42, pp. 377- 388 ,(2007) , 10.1145/1190215.1190270
Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu, Shadow attacks: automatically evading system-call-behavior based malware detection Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 1- 13 ,(2012) , 10.1007/S11416-011-0157-5
Zongqu Zhao, Jinrong Bai, Junfeng Wang, Malware detection method based on the control-flow construct feature of software Iet Information Security. ,vol. 8, pp. 18- 24 ,(2014) , 10.1049/IET-IFS.2012.0289
Jusuk Lee, Kyoochang Jeong, Heejo Lee, Detecting metamorphic malwares using code graphs Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10. pp. 1970- 1977 ,(2010) , 10.1145/1774088.1774505
Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey broadband and wireless computing, communication and applications. pp. 297- 300 ,(2010) , 10.1109/BWCCA.2010.85