2011
DOI: 10.1109/tsmcc.2010.2068544
|View full text |Cite
|
Sign up to set email alerts
|

F-Sign: Automatic, Function-Based Signature Generation for Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(11 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…Once this is done, the final candidate for generation of the unique signature is selected using one of the 2 methods; intelligent candidate selection using entropy score or random selection. Candidate with the highest entropy have large amounts of information, thus they are best suited to generate signatures [6].…”
Section: Signaturementioning
confidence: 99%
See 1 more Smart Citation
“…Once this is done, the final candidate for generation of the unique signature is selected using one of the 2 methods; intelligent candidate selection using entropy score or random selection. Candidate with the highest entropy have large amounts of information, thus they are best suited to generate signatures [6].…”
Section: Signaturementioning
confidence: 99%
“…After detection of anomalous episodes, signatures need to be generated, which can be stored in the attack signature database for further use. F-Sign [6] which is an automatic attack signature generation mechanism complements to generate signatures specific and sensitive in nature. The scholarly material regarding these procedures is studied, analyzed and evaluated to gain detailed information about the same.…”
Section: Introductionmentioning
confidence: 99%
“…We also assume that these transmissions are not encrypted or archived. In these cases, efficient generation of short signatures [Shabtai et al 2010] allows to prevent malicious software from being transmitted even if only part of the transmission is intercepted by the filtering devices. Computers may have anti-virus software.…”
Section: Modeling Assumptionsmentioning
confidence: 99%
“…Route stability [Schwartz et al 2010] and the fact that small enough signatures are sufficient to prevent a malicious file from being transmitted through the network [Shabtai et al 2010], enable PIDPS to implement a very shallow transport layer. It receives the identifier of an attack or a legitimate traffic from the application layer and wraps it in a single message along with the data size label.…”
Section: Network Topologymentioning
confidence: 99%
“…The method based on static analysis generally uses software to disassemble malware files without their execution, and adopts byte-level [3] [4], function-call graph [5] [6], instruction operation codes sequence [7] [8] or string feature [9] to extract signature, which represents structure and function of malware. In the paper [4], malwares are analyzed using two approaches: disassembly, utilizing IDA-Pro, and the application of a dedicated state machine in order to obtain the set of functions comprising the executables based on byte-level. Shanhu Shang [5] uses a novel algorithm to construct the function-call graph from the assembly instructions, and proposes an effective graph matching method based on vertexes to compute similarity between two binaries.…”
Section: Introductionmentioning
confidence: 99%