Proceedings From the Sixth Annual IEEE SMC Information Assurance Workshop 2005
DOI: 10.1109/iaw.2005.1495985
|View full text |Cite
|
Sign up to set email alerts
|

Malware examiner using disassembled code (MEDiC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…In this approach, the code is put under observation and approximate runtime behavior/pattern is predicted to detect the malware. In the static approach, many detection mechanisms are proposed such as annotated context-free graph [125], disassembled code [126], portable executable binary code [127] and honeypots [128]. Using this technique dynamic analysis of the malware is difficult to conceal.…”
Section: Malware Detectionmentioning
confidence: 99%
“…In this approach, the code is put under observation and approximate runtime behavior/pattern is predicted to detect the malware. In the static approach, many detection mechanisms are proposed such as annotated context-free graph [125], disassembled code [126], portable executable binary code [127] and honeypots [128]. Using this technique dynamic analysis of the malware is difficult to conceal.…”
Section: Malware Detectionmentioning
confidence: 99%
“…Considering structural information only, however, can cause high false positives and false negatives. 3 Our method follows the same research direction of [28] and [8], but our approach not only considers structural information of malware, but the functionalities of basic blocks are also considered as well, which is a more fine-grained approach.…”
Section: Motivationmentioning
confidence: 99%
“…Generally, users come to know about the existence of a malware when malware starts to perform malicious activity in the system. The term ‘malware’ is created after merging two basic terms ‘malicious’ and ‘software’ . Today, there are various antivirus products, which are capable enough to detect and remove most of the malwares.…”
Section: Introductionmentioning
confidence: 99%