Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A study on similarity calculation method for API invocation sequences

Full metadata record
DC Field Value Language
dc.contributor.authorShim, Yu Jin-
dc.contributor.authorKim, Tae Guen-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-15T20:26:24Z-
dc.date.available2022-07-15T20:26:24Z-
dc.date.created2021-05-11-
dc.date.issued2015-11-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/156040-
dc.description.abstractMalware variants have been developed and spread in the Internet, and the number of new malware variants is increases every year. Recently, malware is applied with obfuscation and mutation techniques to hide its existence, and malware variants are developed with various automatic tools that transform the properties of existing malware to avoid static analysis based malware detection systems. It is difficult to detect such obfuscated malware with static-based signatures, so we have designed a detection system based on dynamic analysis. In this paper, we propose a dynamic analysis based system that uses the API invocation sequences to compare behaviors of suspicious software with behaviors of existing malware.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titleA study on similarity calculation method for API invocation sequences-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1007/978-3-319-25754-9_43-
dc.identifier.scopusid2-s2.0-84952360257-
dc.identifier.bibliographicCitationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.9436, pp.492 - 501-
dc.relation.isPartOfLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.titleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.volume9436-
dc.citation.startPage492-
dc.citation.endPage501-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusCalculations-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusDynamic analysis-
dc.subject.keywordPlusMalware-
dc.subject.keywordPlusRough set theory-
dc.subject.keywordPlusAPI invocation sequence-
dc.subject.keywordPlusAutomatic tools-
dc.subject.keywordPlusDetection system-
dc.subject.keywordPlusMalware detection-
dc.subject.keywordPlusSimilarity calculation-
dc.subject.keywordPlusStatic analysis-
dc.subject.keywordAuthorAPI invocation sequence-
dc.subject.keywordAuthorDynamic analysis-
dc.subject.keywordAuthorMalware detection-
dc.subject.keywordAuthorSimilarity calculation method-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-319-25754-9_43-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE