Malware classification using instruction frequencies
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Han, Kyoung Soo | - |
dc.contributor.author | Kang, Boojoong | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.date.accessioned | 2022-07-16T18:27:41Z | - |
dc.date.available | 2022-07-16T18:27:41Z | - |
dc.date.created | 2021-05-11 | - |
dc.date.issued | 2011-11 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/167281 | - |
dc.description.abstract | Developing variants of malware is a common and effective method to avoid the signature detection of antivirus programs. Malware analysis and signature abstraction are essential technologies to update the detection signature DB for malware detection. Since most malware binary analysis processes are performed manually, malware binary analysis is a time-consuming job. Therefore, efficient malware classification can be used to speed up malware binary analysis. As malware variants of the same malware family may share a portion of their binary code, the sequences of instructions may be similar, or even identical. In this paper, we propose a malware classification method that uses instruction frequencies. Our test results show that there are clear distinctions among malware and normal programs. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Association for Computing Machinary, Inc. | - |
dc.title | Malware classification using instruction frequencies | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1145/2103380.2103441 | - |
dc.identifier.scopusid | 2-s2.0-84857278570 | - |
dc.identifier.bibliographicCitation | Proceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011, pp.298 - 300 | - |
dc.relation.isPartOf | Proceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011 | - |
dc.citation.title | Proceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011 | - |
dc.citation.startPage | 298 | - |
dc.citation.endPage | 300 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Anti-virus programs | - |
dc.subject.keywordPlus | Binary analysis | - |
dc.subject.keywordPlus | Classification methods | - |
dc.subject.keywordPlus | instruction frequency | - |
dc.subject.keywordPlus | Malware analysis | - |
dc.subject.keywordPlus | Malware detection | - |
dc.subject.keywordPlus | Malwares | - |
dc.subject.keywordPlus | Signature detection | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordAuthor | instruction frequency | - |
dc.subject.keywordAuthor | malware analysis | - |
dc.subject.keywordAuthor | malware classification | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/2103380.2103441 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.