2008
DOI: 10.1007/978-3-540-89900-6_21
|View full text |Cite
|
Sign up to set email alerts
|

Unknown Malcode Detection Using OPCODE Representation

Abstract: Abstract. The recent growth in network usage has motivated the creation of new malicious code for various purposes, including economic ones. Today's signature-based anti-viruses are very accurate, but cannot detect new malicious code. Recently, classification algorithms were employed successfully for the detection of unknown malicious code. However, most of the studies use byte sequence n-grams representation of the binary code of the executables. We propose the use of (Operation Code) OpCodes, generated by di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
114
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 143 publications
(114 citation statements)
references
References 12 publications
0
114
0
Order By: Relevance
“…Known feature sets that have already been used in the past to detect malicious programs: n-grams [4], opcodes [5], Android permissions combined with Control Flow Graphs [6] and several others. Finding the feature set that generalizes the most our observable is the most challenging task.…”
Section: A Feature Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Known feature sets that have already been used in the past to detect malicious programs: n-grams [4], opcodes [5], Android permissions combined with Control Flow Graphs [6] and several others. Finding the feature set that generalizes the most our observable is the most challenging task.…”
Section: A Feature Extractionmentioning
confidence: 99%
“…Dynamic approaches must take into account the multi-entry points issue due to the component-based paradigm of Android, whereas static approaches must deal with known Figure 1. A method translated into a 3-grams vector obfuscation techniques 5 . In this paper, we propose a static approach combining opcode-sequences and machine learning techniques.…”
Section: Introductionmentioning
confidence: 99%
“…The reason of not extracting further opcode-sequence lengths is that the underlying complexity of the feature selection step and the huge amount of features obtained would render the extraction very slow. Besides, an opcode-sequence length of 2 has proven to be the best configuration in a previous work (Moskovitch et al, 2008a).…”
Section: Empirical Studymentioning
confidence: 91%
“…In a previous work Moskovitch et al (2008a), a larger dataset was employed to validate the model. We did not use a larger training dataset because of technical limitations.…”
Section: Empirical Studymentioning
confidence: 99%
See 1 more Smart Citation