2018
DOI: 10.1016/j.diin.2018.04.019
|View full text |Cite
|
Sign up to set email alerts
|

Multinomial malware classification via low-level features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(18 citation statements)
references
References 7 publications
0
17
0
1
Order By: Relevance
“…A previous work [8] presented an attempt to fill the gap between low-level activity (memory access patterns) and its high-level (more human understandable API calls) representation. During the study it was also found, that under the experimental design used in [8] and [7] most of the recorded behavioral activity emerged not from the main module of an executable (after the Entry Point 1 -AEP) but prior to the moment when instruction pointer (IP) is set to the Entry Point (before the Entry Point -BEP). Without going into much details (see Section 2 for details) these findings showed, that it is potentially possible to detect running malicious executable before it starts executing the logic that was put into it by the creator.…”
Section: Introductionmentioning
confidence: 98%
See 3 more Smart Citations
“…A previous work [8] presented an attempt to fill the gap between low-level activity (memory access patterns) and its high-level (more human understandable API calls) representation. During the study it was also found, that under the experimental design used in [8] and [7] most of the recorded behavioral activity emerged not from the main module of an executable (after the Entry Point 1 -AEP) but prior to the moment when instruction pointer (IP) is set to the Entry Point (before the Entry Point -BEP). Without going into much details (see Section 2 for details) these findings showed, that it is potentially possible to detect running malicious executable before it starts executing the logic that was put into it by the creator.…”
Section: Introductionmentioning
confidence: 98%
“…API and system calls, network and file activity are some of the high-level features, while memory access operations, opcodes or hardware performance counters are the low-level features. Basically we perceive behavioral features that emerge from the system's hardware as the low-level ones [7] [13] [20]. Static features are easier to change for an attacker utilizing techniques such as obfuscation or encryption.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Kodun istifadə etdiyi kitabxanalar "stub" adı verilən, daha sonra əsliylə dəyişdiriləcək müvəqqəti kod hissələri ilə dəyişdirilir. Aşağıdakı inyeksiya növlərini kimi göstərmək olar: proseslərin inyeksiyası, kitabxanaların inyeksiyası, yüklənmədən qabaq mühitin inyeksiyası [6].…”
Section: şəKil 3 Hooking Prosesiunclassified