Singular value decomposition and metamorphic detection

作者: Ranjith Kumar Jidigam , Thomas H. Austin , Mark Stamp

DOI: 10.1007/S11416-014-0220-0

关键词:

摘要: Metamorphic malware changes its internal structure with each infection, while maintaining original functionality. Such can be difficult to detect, particularly using static analysis, since there may no common signature across infections. In this paper, we apply a score based on Singular Value Decomposition (SVD) the challenging problem of metamorphic detection. SVD, which viewed as specific implementation Principal Component Analysis, is linear algebraic technique that applicable wide range problems where eigenvector analysis useful. Previous research has shown an eigenvector-based derived from facial recognition yields good results when applied reconsider these previous in context and outline strategy defeat such detection scheme.

参考文章(28)
David M. Chess, Steve R. White, An Undetectable Computer Virus ,(2000)
Jonathon Shlens, A Tutorial on Principal Component Analysis. arXiv: Learning. ,(2014)
Jared Lee, Thomas H. Austin, Mark Stamp, Compression-based analysis of metamorphic malware International Journal of Security and Networks. ,vol. 10, pp. 124- 136 ,(2015) , 10.1504/IJSN.2015.070426
William S Noble, What is a support vector machine Nature Biotechnology. ,vol. 24, pp. 1565- 1567 ,(2006) , 10.1038/NBT1206-1565
Neha Runwal, Richard M. Low, Mark Stamp, Opcode graph similarity and metamorphic detection Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 37- 52 ,(2012) , 10.1007/S11416-012-0160-5
Sayali Deshpande, Younghee Park, Mark Stamp, Eigenvalue analysis for metamorphic detection Journal of Computer Virology and Hacking Techniques. ,vol. 10, pp. 53- 65 ,(2014) , 10.1007/S11416-013-0193-4
Annie H. Toderici, Mark Stamp , Chi-squared distance and metamorphic virus detection Journal of Computer Virology and Hacking Techniques. ,vol. 9, pp. 1- 14 ,(2013) , 10.1007/S11416-012-0171-2
M.E. Saleh, A.B. Mohamed, A.A. Nabi, Eigenviruses for metamorphic virus recognition Iet Information Security. ,vol. 5, pp. 191- 198 ,(2011) , 10.1049/IET-IFS.2010.0136
Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey broadband and wireless computing, communication and applications. pp. 297- 300 ,(2010) , 10.1109/BWCCA.2010.85
Jean-Marie Borello, Ludovic Mé, Code obfuscation techniques for metamorphic viruses Journal in Computer Virology. ,vol. 4, pp. 211- 220 ,(2008) , 10.1007/S11416-008-0084-2