2018
DOI: 10.13052/jcsm2245-1439.741
|View full text |Cite
|
Sign up to set email alerts
|

Malware Characterization Using WindowsAPI Call Sequences

Abstract: In this research we have used Windows API (Win-API) call sequences to capture the behaviour of malicious applications. Detours library by Microsoft has been used to hook the Win-APIs call sequences. To have a higher level of abstraction, related Win-APIs have been mapped to a single category. A total set of 534 important Win-APIs have been hooked and mapped to 26 categories (A.. . Z). Behaviour of any malicious application is captured through sequence of these 26 categories of APIs. In our study, five classes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
(22 reference statements)
0
2
0
1
Order By: Relevance
“…Rather than focusing on API sequences as it pertains to general malicious behavior, researchers have explored common API sequence usage among malware variants and types. In [330], fve classes of malware including Worm, Trojan-Downloader, Trojan-Spy, Trojan-Dropper, and Backdoor were associated based on the presence of 26 API categories and sequences. 534 malware variants were hooked and then categorized based on the presence of these API sequences, which were characteristically diferent for different malware types that aim to pursue diferent objectives through their API usage.…”
Section: Application Programming Interface Sequencesmentioning
confidence: 99%
“…Rather than focusing on API sequences as it pertains to general malicious behavior, researchers have explored common API sequence usage among malware variants and types. In [330], fve classes of malware including Worm, Trojan-Downloader, Trojan-Spy, Trojan-Dropper, and Backdoor were associated based on the presence of 26 API categories and sequences. 534 malware variants were hooked and then categorized based on the presence of these API sequences, which were characteristically diferent for different malware types that aim to pursue diferent objectives through their API usage.…”
Section: Application Programming Interface Sequencesmentioning
confidence: 99%
“…Namun, karena kurangnya sampel, maka peneliti masih belum dapat mengevaluasi kualitas metode yang digunakan untuk membedakan antara malware dan program normal. Selanjutnya penelitian [16] menggunakan urutan panggilan Windows API (Win-API) untuk menangkap perilaku aplikasi berbahaya. Dalam penelitian ini lima kelas malware telah dianalisis yakni Worm, Trojan-Downloader, Trojan-Spy, Trojan-Dropper, dan Backdoor.…”
Section: Gambar 1 Top 10 Anomali Tahun 2021unclassified
“…Malware can be examined by various methods including static and dynamic analysis. The static analysis determines code without using the running state, whereas, the dynamic analysis determines the malware in its running state [7]. In 2023, almost 3 lac instances of malware were created, with 92% spread through email, which proved to be harmful for the computer systems [8].…”
Section: Introductionmentioning
confidence: 99%