Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Fast malware family detection method using control flow graphs

Full metadata record
DC Field Value Language
dc.contributor.authorKang, Boojoong-
dc.contributor.authorKim, Hye Seon-
dc.contributor.authorKim, T.-
dc.contributor.authorKwon, H.-
dc.contributor.authorIm, E.G.-
dc.date.accessioned2022-07-16T18:27:45Z-
dc.date.available2022-07-16T18:27:45Z-
dc.date.created2021-05-11-
dc.date.issued2011-11-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/167282-
dc.description.abstractAs attackers make variants of existing malware, it is possible to detect unknown malware by comparing with already-known malware's information. Control flow graphs have been used in dynamic analysis of program source code. In this paper, we proposed a new method which can analyze and detect malware binaries using control flow graphs and Bloom filter by abstracting common characteristics of malware families. The experimental results showed that processing overhead of our proposed method is much lower than n-gram based methods.-
dc.language영어-
dc.language.isoen-
dc.publisherAssociation for Computing Machinary, Inc.-
dc.titleFast malware family detection method using control flow graphs-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, E.G.-
dc.identifier.doi10.1145/2103380.2103439-
dc.identifier.scopusid2-s2.0-84863145461-
dc.identifier.bibliographicCitationProceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011, pp.287 - 292-
dc.relation.isPartOfProceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011-
dc.citation.titleProceedings of the 2011 ACM Research in Applied Computation Symposium, RACS 2011-
dc.citation.startPage287-
dc.citation.endPage292-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusBloom filters-
dc.subject.keywordPluscontrol flow graph-
dc.subject.keywordPlusControl flow graphs-
dc.subject.keywordPlusDetection methods-
dc.subject.keywordPlusMalware analysis-
dc.subject.keywordPlusMalwares-
dc.subject.keywordPlusProcessing overhead-
dc.subject.keywordPlusProgram source codes-
dc.subject.keywordPlusBlooms (metal)-
dc.subject.keywordPlusData flow analysis-
dc.subject.keywordPlusFlow graphs-
dc.subject.keywordPlusGraphic methods-
dc.subject.keywordPlusNetwork security-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordAuthorBloom filter-
dc.subject.keywordAuthorcontrol flow graph-
dc.subject.keywordAuthormalware analysis-
dc.subject.keywordAuthornetwork security-
dc.identifier.urlhttps://dl.acm.org/doi/10.1145/2103380.2103439-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE