2009
DOI: 10.1007/978-3-642-02617-1_24
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…However, one of the biggest challenges is that an AM strategy that has been found to be successful in a given time period cannot work at a much later time. This philosophy is supported by the works found in [1], [2], [9], [15], [16], [20] and [21], which indicates that current techniques fail to find the distinctive patterns of malicious software which can be used to identify future malwares. The argument is that malware evolves with time and eventually becomes unrecognizable from the original form; in addition completely new malware is designed which is unlike any known malware and so would not be detected by anti-virus software constructed to detect known types of malware.…”
Section: Introductionmentioning
confidence: 74%
“…However, one of the biggest challenges is that an AM strategy that has been found to be successful in a given time period cannot work at a much later time. This philosophy is supported by the works found in [1], [2], [9], [15], [16], [20] and [21], which indicates that current techniques fail to find the distinctive patterns of malicious software which can be used to identify future malwares. The argument is that malware evolves with time and eventually becomes unrecognizable from the original form; in addition completely new malware is designed which is unlike any known malware and so would not be detected by anti-virus software constructed to detect known types of malware.…”
Section: Introductionmentioning
confidence: 74%
“…The work in [15,21,13,2,1,19,14,9] supports the argument that an anti-virus strategy which has been successful in a given time period will not work at a much later date; this, they argue, is due to changes in malware design which evolves with time and eventually becomes unrecognizable from the original form. Their work indicates that current techniques failed to find a distinctive pattern of malicious software which can be used to identify future malware with the level of accuracy required.…”
Section: Introductionmentioning
confidence: 83%
“…As a result, interest continues to grow in methods to improve automatic signature extraction. Semantic approaches [4] [5], in addition to standard dynamic and execution behavior analysis [6] [7], now include methods such as control flow analysis [8] [9], behavior model checking [10] [11], executable graph mining [12] and formal semantic models of analysis [13]. The main problem with a semantic approach is that an infection must occur to produce anomalous behavior.…”
Section: Introductionmentioning
confidence: 99%