2010 IEEE International Conference on Intelligent Computing and Intelligent Systems 2010
DOI: 10.1109/icicisys.2010.5658586
|View full text |Cite
|
Sign up to set email alerts
|

HERO: A novel malware detection framework based on binary translation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Guo et al (2010) proposed a framework that combined static and dynamic binary translation features to detect malware and prevent its execution. They apply behavior Control Flow Graph (CFG) and then critical API Graph based on CFG is generated to do sub-graph matching.…”
Section: Fig 3: Proposed Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Guo et al (2010) proposed a framework that combined static and dynamic binary translation features to detect malware and prevent its execution. They apply behavior Control Flow Graph (CFG) and then critical API Graph based on CFG is generated to do sub-graph matching.…”
Section: Fig 3: Proposed Frameworkmentioning
confidence: 99%
“…On the other hand (Kostakis et al, 2011) built the graph from the subroutines as nodes and their call references as edges, (Kim and Moon, 2010) they use a dependency graph whose vertex represents a line in the semantic code. The dependency between two lines is represented by a directed edge and (Bai et al, 2009;Guo et al, 2010) extract a Critical API Graph (CAG) from a Control Flow Graph (CFG) for each malware to define the behavior.…”
Section: Fig 3: Proposed Frameworkmentioning
confidence: 99%