2019
DOI: 10.1016/j.cose.2019.02.007
|View full text |Cite
|
Sign up to set email alerts
|

MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 112 publications
(51 citation statements)
references
References 29 publications
0
51
0
Order By: Relevance
“…In the process of classification, the authors found that 30% of the papers are based on static analysis approaches. For example, a method of Application Security Triage (MAST) helps in malware selection by statistical analysis approach [31][32][33][34][35]. The authors of this SLR also found similar static analysis studies that proposed a better research environment.…”
Section: Ranking Examinationmentioning
confidence: 89%
“…In the process of classification, the authors found that 30% of the papers are based on static analysis approaches. For example, a method of Application Security Triage (MAST) helps in malware selection by statistical analysis approach [31][32][33][34][35]. The authors of this SLR also found similar static analysis studies that proposed a better research environment.…”
Section: Ranking Examinationmentioning
confidence: 89%
“…In another category of malware, malicious components are downloaded at run-time, which requires dynamic analysis to detect these malwares [8]. For instance, the authors [9] have provided a method for detecting malware concerning the correlation between static and dynamic features. Also, the authors [10] have come up with a way to detect malware in Android applications, by combining static analysis and outlier detection.…”
Section: General Definitionmentioning
confidence: 99%
“…Similarity-based machine learning algorithms, such as LCS, Minkowski distance, and Cosine similarity, are then trained using these features to classify the samples into benign and malicious classes. Similarly, authors of [20], propose a malware detection framework, MalDAE, that correlates dynamic and static features from the sequence of API calls. Experimental results of both works have shown that although the syntax of the dynamic and static API call features is different, there is a semantic mapping and clear relation between them.…”
Section: Malware Detectionmentioning
confidence: 99%