2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sus 2016
DOI: 10.1109/bdcloud-socialcom-sustaincom.2016.96
|View full text |Cite
|
Sign up to set email alerts
|

Malware Sequence Alignment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Although the vast majority of previous works did not use long N -gram features for malware detection/classification, as done by DAEMON, a few exceptions exist. Dinh et al [42] employed the Smith-Waterman DNA sequence alignment algorithm in order to generate family signatures. They have found a few interesting sequences in the Ramnit and Lollipop families of Microsoft's dataset.…”
Section: B Static Analysismentioning
confidence: 99%
“…Although the vast majority of previous works did not use long N -gram features for malware detection/classification, as done by DAEMON, a few exceptions exist. Dinh et al [42] employed the Smith-Waterman DNA sequence alignment algorithm in order to generate family signatures. They have found a few interesting sequences in the Ramnit and Lollipop families of Microsoft's dataset.…”
Section: B Static Analysismentioning
confidence: 99%
“…packers can easily break many such patterns. Therefore, malware authors create various malware instances from the same malware family [22]. As a result, members of the same malware family are functionally identical, even though their binaries may greatly differ.…”
Section: Introductionmentioning
confidence: 99%