作者
Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, Daisuke Inoue
发表日期
2018/11/1
期刊
IEICE TRANSACTIONS on Information and Systems
卷号
101
期号
11
页码范围
2622-2632
出版商
The Institute of Electronics, Information and Communication Engineers
简介
Analyzing a malware sample requires much more time and cost than creating it. To understand the behavior of a given malware sample, security analysts often make use of API call logs collected by the dynamic malware analysis tools such as a sandbox. As the amount of the log generated for a malware sample could become tremendously large, inspecting the log requires a time-consuming effort. Meanwhile, antivirus vendors usually publish malware analysis reports (vendor reports) on their websites. These malware analysis reports are the results of careful analysis done by security experts. The problem is that even though there are such analyzed examples for malware samples, associating the vendor reports with the sandbox logs is difficult. This makes security analysts not able to retrieve useful information described in vendor reports. To address this issue, we developed a system called AMAR-Generator that …
引用总数
20202021202220232212
学术搜索中的文章
B Sun, A Fujino, T Mori, T Ban, T Takahashi, D Inoue - IEICE TRANSACTIONS on Information and Systems, 2018