Title
Malware Variant Detection and Classification Using Control Flow Graph.
Abstract
The number of malware increases steadily and is too many. So a malware analyst cannot analyze these manually. Therefore many researchers are working on automatic malware analysis. As a result of these researches, there are so many algorithms. The representative example may be a behavior based malware automatic analysis system. For example, these are the Bitblaze [1], Anubis[2], and so on. However these behaviors based analysis result is not enough. So for more detail analysis and advanced automatic analysis feature, the automatic static analysis engine is necessary. Then some projects apply an automatic static analysis engine and the research on automatic static analysis is working. These analysis methods use the structural characteristic of malware, and that is the reason the malware is also software, there is a toolkit for a malware generation, and a malware author reuse some codes. For automatic static analysis, it is so useful that the static analysis engine uses the structural characteristic of malware. However previous researches have some problem. For example, these are a performance, false positive, detection ratio, and so on. Therefore we'll describe another method that used the structural characteristic of malware.
Year
DOI
Venue
2011
10.1007/978-3-642-24106-2_23
Communications in Computer and Information Science
Keywords
Field
DocType
Malware,Malicious Software,Control Flow Graph,Structural Analysis,Profiling,Signature,Security
Control flow graph,Computer science,Profiling (computer programming),Reuse,Static analysis,Software,Artificial intelligence,Malware,Machine learning,Malware analysis
Conference
Volume
ISSN
Citations 
206
1865-0929
0
PageRank 
References 
Authors
0.34
7
3
Name
Order
Citations
PageRank
Donghwi Shin101.35
Kwang-Woo Lee272.99
Dongho Won31262154.14