2010
DOI: 10.1007/s11416-010-0141-5
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection using assembly and API call sequences

Abstract: One of the major problems concerning information assurance is malicious code. To evade detection, malware has also been encrypted or obfuscated to produce variants that continue to plague properly defended and patched networks with zero day exploits. With malware and malware authors using obfuscation techniques to generate automated polymorphic and metamorphic versions, antivirus software must always keep up with their samples and create a signature that can recognize the new variants. Creating a signature for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(47 citation statements)
references
References 7 publications
0
47
0
Order By: Relevance
“…Others extract API call sequence for each class and develop static signature based on it [8][9][10][11]. They are better from the semantic view because they monitor the sequence of calls and the flow of programs.…”
Section: International Journal Of Distributed Sensor Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Others extract API call sequence for each class and develop static signature based on it [8][9][10][11]. They are better from the semantic view because they monitor the sequence of calls and the flow of programs.…”
Section: International Journal Of Distributed Sensor Networkmentioning
confidence: 99%
“…With static approach [6,10,11,21], API list can be extracted from PE format of the executable files. With dynamic approach [7][8][9][22][23][24], the APIs that are called can be observed by running the executable files (usually run on virtual machine). There are two major ways to analyze the API call information gathered through the static approach.…”
Section: Malware Analysismentioning
confidence: 99%
“…These data sources could include information based on the static analysis of the binary and the API sequence calls made by the program. Methods based on these data sources have been shown to be successful [30,33,39], and could possibly lead to more accurate results when combined in our multiple kernel learning framework.…”
Section: Future Workmentioning
confidence: 99%
“…Shankarapani et al [6] presented a methodology for composing signatures of malicious codes from PEs for identifying known and unknown malware. The key assumption of their idea is that to preserve its functionality a polymorphic malware should contain a sufficiently similar API calling sequence or assembly code.…”
Section: ⅱ Malware Classificationmentioning
confidence: 99%
“…The authors later enhanced it and presented a sequence alignment method using binary scoring and a signature-updating scheme to detect masquerade attacks [20] . Another recent approach to detection is analyzing API call sequences and classifying them as benign or malicious [21] .…”
Section: ⅱ Malware Classificationmentioning
confidence: 99%