Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

A Human-in-the-Loop Approach to Malware Author Classification

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Eujeanne-
dc.contributor.authorPark, Sung-Jun-
dc.contributor.authorChae, Dong-Kyu-
dc.contributor.authorChoi, Seokwoo-
dc.contributor.authorKim, Sang-Wook-
dc.date.accessioned2022-07-07T14:32:01Z-
dc.date.available2022-07-07T14:32:01Z-
dc.date.created2021-05-13-
dc.date.issued2020-10-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/144954-
dc.description.abstractFor these few decades malwares have been posing a major concern in the cyber security. Recently, a number of "author groups" have been generating lots of newmalwares by sharing source code within a group and exploiting evasive schemes such as polymorphism and metamorphism. This motivates us to study the problem of identifying the author group of a given malware, which would be able to work for not only blocking malwares but also legally punishing suspected malware authors. In this paper, we propose a human-machine collaborative approach for classifying author groups of malwares accurately. We also propose a visualization method for helping human experts to make the decision easily. We verify the superiority of our framework through extensive experiments using real-world malware data.-
dc.language영어-
dc.language.isoen-
dc.publisherAssociation for Computing Machinery-
dc.titleA Human-in-the-Loop Approach to Malware Author Classification-
dc.typeArticle-
dc.contributor.affiliatedAuthorChae, Dong-Kyu-
dc.contributor.affiliatedAuthorKim, Sang-Wook-
dc.identifier.doi10.1145/3340531.3417467-
dc.identifier.scopusid2-s2.0-85095865787-
dc.identifier.bibliographicCitationInternational Conference on Information and Knowledge Management, Proceedings, pp.3289 - 3292-
dc.relation.isPartOfInternational Conference on Information and Knowledge Management, Proceedings-
dc.citation.titleInternational Conference on Information and Knowledge Management, Proceedings-
dc.citation.startPage3289-
dc.citation.endPage3292-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusKnowledge management-
dc.subject.keywordPlusCollaborative approach-
dc.subject.keywordPlusCyber security-
dc.subject.keywordPlusHuman expert-
dc.subject.keywordPlusHuman-in-the-loop-
dc.subject.keywordPlusHuman-machine-
dc.subject.keywordPlusReal-world-
dc.subject.keywordPlusSource codes-
dc.subject.keywordPlusVisualization method-
dc.subject.keywordPlusMalware-
dc.subject.keywordAuthorhuman-in-the-loop approach-
dc.subject.keywordAuthormalware author groups-
dc.subject.keywordAuthormalware classification-
dc.identifier.urlhttps://dl.acm.org/doi/10.1145/3340531.3417467-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Chae, Dong Kyu photo

Chae, Dong Kyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE