2013
DOI: 10.1007/978-3-642-37300-8_6
|View full text |Cite
|
Sign up to set email alerts
|

A Static, Packer-Agnostic Filter to Detect Similar Malware Samples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(41 citation statements)
references
References 15 publications
0
41
0
Order By: Relevance
“…Clustering and classification of the results of static analysis of files has been previously proposed for prefiltering for in-depth file analysis [18], [26], [34]. Our work differs in that we classify telemetry reports for files with analyzed on remote computers.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…Clustering and classification of the results of static analysis of files has been previously proposed for prefiltering for in-depth file analysis [18], [26], [34]. Our work differs in that we classify telemetry reports for files with analyzed on remote computers.…”
Section: Related Workmentioning
confidence: 97%
“…Recently, several systems have been proposed for prefiltering (i.e. ranking) samples for in-depth analysis [18], [26], [34], but these systems require a sample of the file for classification and clustering on the results of static analysis. In our system, the AM client can perform both static and dynamic analysis of the file on the remote computer, and we use this telemetry information for prefiltering.…”
Section: Introductionmentioning
confidence: 99%
“…We use a pragmatic approach to deal with packing: We let the executable unpack, de-obfuscate and run for at least 15 minutes and work on the memory snapshot. Defeating packing is not the focus of our work, and any of the more advanced unpacking techniques in the literature [15,25,34] can be used to augment our prototype.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…An example is the method by Jacob et al [11] that, similar to Kandi, exploits statistical artifacts preserved through packing in order to analyze malware. The method does not focus on deobfuscation but rather efficiently comparing malware binaries and determining variants of the same family without dynamic analysis.…”
Section: Related Workmentioning
confidence: 99%