Detecting self-mutating malware using control-flow graph matching

159Citations
Citations of this article
123Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Next generation malware will by be characterized by the intense use of polymorphic and metamorphic techniques aimed at circumventing the current malware detectors, based on pattern matching. In order to deal with this new kind of threat, novel techniques have to be devised for the realization of malware detectors. Recent papers started to address such an issue and this paper represents a further contribution in such a field. More precisely in this paper we propose a strategy for the detection of metamorphic malicious code inside a program P based on the comparison of the control flow graphs of P against the set of control flow graphs of known malware. We also provide experimental data supporting the validity of our strategy. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Bruschi, D., Martignoni, L., & Monga, M. (2006). Detecting self-mutating malware using control-flow graph matching. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4064 LNCS, pp. 129–143). Springer Verlag. https://doi.org/10.1007/11790754_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free