A visualization technique for installation evidences containing malicious executable files using machine language sequence

0Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the modern society the majority of information is stored and preserved on the digitalized storage medium. By the way, it is difficult to recognize that there are any adding, deleting, or changing of the records in the digitalized storage medium. In this paper, we suggest an evidence detection technique of malicious executable file installation on computer system using visualization of similarity between machine language sequences. Also suggested method can not only detect original malwares but also mutants of them. Besides, our method can help to reassemble the data blocks containing the fragments of the malicious file back into their proper sequences for securing legal evidences. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Park, J. H., Kim, M., & Noh, B. N. (2009). A visualization technique for installation evidences containing malicious executable files using machine language sequence. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5379 LNCS, pp. 201–210). https://doi.org/10.1007/978-3-642-00306-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free