Proceedings of the Asian Internet Engineeering Conference on - AINTEC '12 2012
DOI: 10.1145/2402599.2402604
|View full text |Cite
|
Sign up to set email alerts
|

Malware classification based on extracted API sequences using static analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…Feature sets commonly used for static analysis include strings, byte sequences, and program structure [8]- [10]; API imports and API calls [11]; and control flow information [12]- [14]. Commonly used classification algorithms include naïve Bayes, decision trees, support vector machines (SVMs) [8], [10], image classification techniques [9], hierarchical clustering analysis [11], and graph matching and clustering algorithms [12]- [14].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Feature sets commonly used for static analysis include strings, byte sequences, and program structure [8]- [10]; API imports and API calls [11]; and control flow information [12]- [14]. Commonly used classification algorithms include naïve Bayes, decision trees, support vector machines (SVMs) [8], [10], image classification techniques [9], hierarchical clustering analysis [11], and graph matching and clustering algorithms [12]- [14].…”
Section: Related Workmentioning
confidence: 99%
“…Commonly used classification algorithms include naïve Bayes, decision trees, support vector machines (SVMs) [8], [10], image classification techniques [9], hierarchical clustering analysis [11], and graph matching and clustering algorithms [12]- [14].…”
Section: Related Workmentioning
confidence: 99%
“…The key assumption of their idea is that to preserve its functionality a polymorphic malware should contain a sufficiently similar API calling sequence or assembly code. Iwamoto et al [7] proposed a malware classification that extracts features with API function calls. To visualize the grouping of samples with similar features they used hierarchical cluster analysis.…”
Section: ⅱ Malware Classificationmentioning
confidence: 99%
“…Two techniques for malware classification using sequence alignment have recently been proposed [7,22] .…”
Section: ⅱ Malware Classificationmentioning
confidence: 99%
See 1 more Smart Citation