Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Classifying malwares for identification of author groups

Full metadata record
DC Field Value Language
dc.contributor.authorHong, Jiwon-
dc.contributor.authorPark, Sanghyun-
dc.contributor.authorKim, Sang-Wook-
dc.contributor.authorKim, Dongphil-
dc.contributor.authorKim, Wonho-
dc.date.accessioned2022-07-12T13:52:03Z-
dc.date.available2022-07-12T13:52:03Z-
dc.date.created2021-05-12-
dc.date.issued2018-02-
dc.identifier.issn1532-0626-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/150625-
dc.description.abstractMalwares are growing exponentially in number, and authors of malwares are continuously releasing new ones. Malwares developed by the same author group might have similar signatures. For a number of applications including digital forensic and law enforcement, such characteristics can be used to determine which author group is likely to have released a given malware. In this paper, we describe a new type of classification that identifies which group of authors is most likely to have developed a given malware. We identify and verify a set of various features obtained through static and dynamic analyses of malwares and exploit them for classification. We evaluate our approach through extensive experiments with a real-world dataset labeled by a group of domain experts. The results show that our approach is effective and provides good accuracy in malware classification.-
dc.language영어-
dc.language.isoen-
dc.publisherWILEY-
dc.titleClassifying malwares for identification of author groups-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Sang-Wook-
dc.identifier.doi10.1002/cpe.4197-
dc.identifier.scopusid2-s2.0-85026436057-
dc.identifier.wosid000419780000006-
dc.identifier.bibliographicCitationCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, v.30, no.3-
dc.relation.isPartOfCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE-
dc.citation.titleCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE-
dc.citation.volume30-
dc.citation.number3-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusCLASSIFICATION-
dc.subject.keywordAuthordynamic analysis-
dc.subject.keywordAuthorfeature extraction-
dc.subject.keywordAuthormalware classification-
dc.subject.keywordAuthorstatic analysis-
dc.identifier.urlhttps://onlinelibrary.wiley.com/doi/10.1002/cpe.4197-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Sang-Wook photo

Kim, Sang-Wook
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE