Detecting obfuscated malware using reduced opcode set and optimised runtime trace

  • O’kane P
  • Sezer S
  • McLaughlin K
N/ACitations
Citations of this article
44Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The research presented, investigates the optimal set of operational codes (opcodes) that create a robust indicator of malicious software (malware) and also determines a program's execution duration for accurate classification of benign and malicious software. The features extracted from the dataset are opcode density histograms, extracted during the program execution. The classifier used is a support vector machine and is configured to select those features to produce the optimal classification of malware over different program run lengths. The findings demonstrate that malware can be detected using dynamic analysis with relatively few opcodes.

Cite

CITATION STYLE

APA

O’kane, P., Sezer, S., & McLaughlin, K. (2016). Detecting obfuscated malware using reduced opcode set and optimised runtime trace. Security Informatics, 5(1). https://doi.org/10.1186/s13388-016-0027-2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free