2007
DOI: 10.1007/s11416-007-0057-x
|View full text |Cite
|
Sign up to set email alerts
|

On callgraphs and generative mechanisms

Abstract: This paper examines the structural features of callgraphs. The sample consisted of 120 malicious and 280 non-malicious executables. Pareto models were fitted to indegree, outdegree and basic block count distribution, and a statistically significant difference shown for the derived power law exponent. A two-step optimization process involving human designers and code compilers is proposed to account for these structural features of executables.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…While the maximum detection rate with the lowest false negative is achieved for the longest program run‐lengths, a good detection rate with an acceptable false negative rate is obtained with ‘logic and arithmetic’ opcodes with a program run length of 1 K. This is consistent with present understanding of malware in that, in the early stages of start‐up, it needs to unpack or decipher the executable code. Bilar et al [3] show that the structure complexity of malware is less than that of non‐malicious software, which has been borne out by the finding produced by the SVM. Fig. 5 presents the data in a format that – The opcodes used for the maximum detection are summed across all the different program run‐lengths and weighted with their respective percentage detection rates.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…While the maximum detection rate with the lowest false negative is achieved for the longest program run‐lengths, a good detection rate with an acceptable false negative rate is obtained with ‘logic and arithmetic’ opcodes with a program run length of 1 K. This is consistent with present understanding of malware in that, in the early stages of start‐up, it needs to unpack or decipher the executable code. Bilar et al [3] show that the structure complexity of malware is less than that of non‐malicious software, which has been borne out by the finding produced by the SVM. Fig. 5 presents the data in a format that – The opcodes used for the maximum detection are summed across all the different program run‐lengths and weighted with their respective percentage detection rates.…”
Section: Discussionmentioning
confidence: 99%
“…In another research, Bilar [3] compared the statically generated CFG of benign and malicious code. His findings showed a difference in the basic block count for benign and malicious code.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Bilar 16 analyzes the struct of malware and goodware callgraphs regarding some properties, such as amount of normal internal function calls, amount of calls to external functions statically (libraries) or dynamically (imports) and amount of thunks (usually function envelopes). The results are presented in a statistical way and with several scatter-plots where each point color is proportional to the executable file size.…”
Section: Security Data Visualizationmentioning
confidence: 99%