2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) 2014
DOI: 10.1109/ccnc.2014.6866599
|View full text |Cite
|
Sign up to set email alerts
|

Detection of zero-day malware based on the analysis of opcode sequences

Abstract: Esitetään Jyväskylän yliopiston informaatioteknologian tiedekunnan suostumuksella julkisesti tarkastettavaksi yliopiston vanhassa juhlasalissa S212 toukokuun 22. päivänä 2014 kello 12.Academic dissertation to be publicly discussed, by permission of the Faculty of Information Technology of the University of Jyväskylä, in building Seminarium, auditorium S212 on May 22, 2014 at 12 o'clock noon. UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄ 2014On This work focuses on the application of different methods and algorithms of dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 88 publications
0
12
0
Order By: Relevance
“…Two key elements have been extracted, reviewed and examined in this systematic review, namely detection methods and their accompanying statistics (empirical evidence) to evaluate their efficiency. The first technique observed was Opcode based, Operands of Opcode provide additional information about the suspicious file (Zolotukhin and Hamalainen, 2014) which might help in detecting other malware variants. However, this will require large number of labelled executables for each variant, and it is difficult to acquire such data (Santos et al, 2011).…”
Section: Conclusion and Further Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Two key elements have been extracted, reviewed and examined in this systematic review, namely detection methods and their accompanying statistics (empirical evidence) to evaluate their efficiency. The first technique observed was Opcode based, Operands of Opcode provide additional information about the suspicious file (Zolotukhin and Hamalainen, 2014) which might help in detecting other malware variants. However, this will require large number of labelled executables for each variant, and it is difficult to acquire such data (Santos et al, 2011).…”
Section: Conclusion and Further Discussionmentioning
confidence: 99%
“…Opcode is the portion of the code that specifies the operations while Operands (the data to be processed) could provide extra information about the executable files (Zolotukhin and Hamalainen, 2014). The source code of a given software, including Opcode, is more consistent and therefore suitable to produce signatures for malicious software-classes compared to compiled code.…”
Section: A Operational Code (Opcode)mentioning
confidence: 99%
“…Also, N-gram is widely used in malware detection domain. Mikhail used N-gram model to extract essential feature from operation code sequence and construct an N-gram frequency vector [12]. The example of N-gram with Opcode is shown in fig.…”
Section: N-grammentioning
confidence: 99%
“…To defend against zero-day malware there has been a shift from signature-based [5][6][7][8]38] to anomaly-based detection [9] and behavioral-based detection [10][11][12][13][14][15][16]39]. Various behavior-based detection techniques have been proposed that understands the behavior of zero-day malware through dynamic execution [10,11].…”
Section: Introductionmentioning
confidence: 99%