Malware variant detection and classification using control flow graph

5Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The number of malware increases steadily and is too many. So a malware analyst cannot analyze these manually. Therefore many researchers are working on automatic malware analysis. As a result of these researches, there are so many algorithms. The representative example may be a behavior based malware automatic analysis system. For example, these are the Bitblaze [1], Anubis[2], and so on. However these behaviors based analysis result is not enough. So for more detail analysis and advanced automatic analysis feature, the automatic static analysis engine is necessary. Then some projects apply an automatic static analysis engine and the research on automatic static analysis is working. These analysis methods use the structural characteristic of malware, and that is the reason the malware is also software, there is a toolkit for a malware generation, and a malware author reuse some codes. For automatic static analysis, it is so useful that the static analysis engine uses the structural characteristic of malware. However previous researches have some problem. For example, these are a performance, false positive, detection ratio, and so on. Therefore we'll describe another method that used the structural characteristic of malware. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Shin, D., Lee, K., & Won, D. (2011). Malware variant detection and classification using control flow graph. In Communications in Computer and Information Science (Vol. 206 CCIS, pp. 174–181). https://doi.org/10.1007/978-3-642-24106-2_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free