A Human-in-the-Loop Approach to Malware Author Classification
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Eujeanne | - |
dc.contributor.author | Park, Sung-Jun | - |
dc.contributor.author | Chae, Dong-Kyu | - |
dc.contributor.author | Choi, Seokwoo | - |
dc.contributor.author | Kim, Sang-Wook | - |
dc.date.accessioned | 2022-07-07T14:32:01Z | - |
dc.date.available | 2022-07-07T14:32:01Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2020-10 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/144954 | - |
dc.description.abstract | For these few decades malwares have been posing a major concern in the cyber security. Recently, a number of "author groups" have been generating lots of newmalwares by sharing source code within a group and exploiting evasive schemes such as polymorphism and metamorphism. This motivates us to study the problem of identifying the author group of a given malware, which would be able to work for not only blocking malwares but also legally punishing suspected malware authors. In this paper, we propose a human-machine collaborative approach for classifying author groups of malwares accurately. We also propose a visualization method for helping human experts to make the decision easily. We verify the superiority of our framework through extensive experiments using real-world malware data. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Association for Computing Machinery | - |
dc.title | A Human-in-the-Loop Approach to Malware Author Classification | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Chae, Dong-Kyu | - |
dc.contributor.affiliatedAuthor | Kim, Sang-Wook | - |
dc.identifier.doi | 10.1145/3340531.3417467 | - |
dc.identifier.scopusid | 2-s2.0-85095865787 | - |
dc.identifier.bibliographicCitation | International Conference on Information and Knowledge Management, Proceedings, pp.3289 - 3292 | - |
dc.relation.isPartOf | International Conference on Information and Knowledge Management, Proceedings | - |
dc.citation.title | International Conference on Information and Knowledge Management, Proceedings | - |
dc.citation.startPage | 3289 | - |
dc.citation.endPage | 3292 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Knowledge management | - |
dc.subject.keywordPlus | Collaborative approach | - |
dc.subject.keywordPlus | Cyber security | - |
dc.subject.keywordPlus | Human expert | - |
dc.subject.keywordPlus | Human-in-the-loop | - |
dc.subject.keywordPlus | Human-machine | - |
dc.subject.keywordPlus | Real-world | - |
dc.subject.keywordPlus | Source codes | - |
dc.subject.keywordPlus | Visualization method | - |
dc.subject.keywordPlus | Malware | - |
dc.subject.keywordAuthor | human-in-the-loop approach | - |
dc.subject.keywordAuthor | malware author groups | - |
dc.subject.keywordAuthor | malware classification | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/3340531.3417467 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.