2017
DOI: 10.1007/s11416-017-0307-5
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent OS X malware threat detection with code inspection

Abstract: With the increasing market share of Mac OS X operating system, there is a corresponding increase in the number of malicious programs (malware) designed to exploit vulnerabilities on Mac OS X platforms. However, existing manual and heuristic OS X malware detection techniques are not capable of coping with such a high rate of malware. While machine learning techniques offer promising results in automated detection of Windows and Android malware, there have been limited efforts in extending them to OS X malware d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 54 publications
(17 citation statements)
references
References 32 publications
0
17
0
Order By: Relevance
“…A supervised ML model is proposed in [78]. The model applied a kernel base SVM that used weighting measures, which calculates the frequency of each library call to detect Mac OS X malware.…”
Section: ) Related Work For Behavior-based Detectionmentioning
confidence: 99%
“…A supervised ML model is proposed in [78]. The model applied a kernel base SVM that used weighting measures, which calculates the frequency of each library call to detect Mac OS X malware.…”
Section: ) Related Work For Behavior-based Detectionmentioning
confidence: 99%
“…They also provide bindings for scripting languages such as Python. Static features can be feed to machine learning algorithms to automatically classify malware samples in [4,10]. They extracted binary header, load commands, and segments features from the dataset of 2300 benign and 760 malicious samples and achieved 96.62% accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…There has been effort to merge machine learning techniques with static and dynamic malware analysis techniques to automate malware analysis tasks . Unlike Windows, Linux, OSX, and Android malware, IoT malware detection appears to be a topic that is under‐studied, perhaps due to the diversity in such devices with varying computational capabilities and resource‐constrained effects (eg, sensors, 3D printers, smart TV, smart fridge, and intelligent roadside units). Azmoodeh et al proposed a method for crypto‐ransomware detection in IoT networks based on power consumption.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to existing approaches, including our previous approach, we use the typical metrics – True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN) – to evaluate the performance of our proposed approach. TP reflects malware samples that are correctly predicted, TN demonstrates goodware samples that are correctly predicted, FP indicates goodware samples that are incorrectly predicted as a malware, and FN shows malware samples that are incorrectly predicted as benign.…”
Section: Introductionmentioning
confidence: 99%