2014
DOI: 10.1007/s10207-014-0242-0
|View full text |Cite
|
Sign up to set email alerts
|

Malware analysis using visualized images and entropy graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 134 publications
(65 citation statements)
references
References 22 publications
0
64
1
Order By: Relevance
“…Their method represented a binary file as a grayscale image by converting each bit value into an image pixel. Han et al [9] converted the images into entropy graphs. Their system used the bitmap image to calculate the entropy value of each line and generate an entropy graph.…”
Section: Related Workmentioning
confidence: 99%
“…Their method represented a binary file as a grayscale image by converting each bit value into an image pixel. Han et al [9] converted the images into entropy graphs. Their system used the bitmap image to calculate the entropy value of each line and generate an entropy graph.…”
Section: Related Workmentioning
confidence: 99%
“…As exemplified in previous section, there are two broad categories of visualisation techniques adopted for malware comparison, namely, image-based and feature-based [10,45]. Image-based techniques make use of visual images of either binary data or behaviour logs of the malware samples [46]. Images generated in this approach are similar to those shown in Figures 1 and 2, where visual mappings are used to generate an image for each malware sample.…”
Section: Proposed Methods Using Similarity Miningmentioning
confidence: 99%
“…Han et al [33], [34] proposed several transformation methods to convert the opcode sequences extracted from malware samples into image matrices represented in RGBcolored pixels. In a later work of the same authors [9], binaries are converted into bitmap images, which are then converted to entropy graphs to calculate the similarities. This approach however, only works for Windows PE file because it needs PE header information to decide sections to be converted.…”
Section: Hit Entropymentioning
confidence: 99%