Malware classification based on call graph clustering

J Kinable, O Kostakis - Journal in computer virology, 2011 - Springer
Each day, anti-virus companies receive tens of thousands samples of potentially harmful
executables. Many of the malicious samples are variations of previously encountered …

A malware detection method based on family behavior graph

Y Ding, X Xia, S Chen, Y Li - Computers & Security, 2018 - Elsevier
Graph-based malware detection methods must build a behavior graph for each known
malware, and they are difficult to apply in practice. To solve this issue, we study how to build …

Binslayer: accurate comparison of binary executables

M Bourquin, A King, E Robbins - Proceedings of the 2nd ACM SIGPLAN …, 2013 - dl.acm.org
As the volume of malware inexorably rises, comparison of binary code is of increasing
importance to security analysts as a method of automatically classifying new malware …

Scalable function call graph-based malware classification

M Hassen, PK Chan - Proceedings of the Seventh ACM on Conference …, 2017 - dl.acm.org
In an attempt to preserve the structural information in malware binaries during feature
extraction, function call graph-based features have been used in various research works in …

A large-scale database for graph representation learning

S Freitas, Y Dong, J Neil, DH Chau - arXiv preprint arXiv:2011.07682, 2020 - arxiv.org
With the rapid emergence of graph representation learning, the construction of new large-
scale datasets is necessary to distinguish model capabilities and accurately assess the …

[PDF][PDF] Malware detection based on hybrid signature behaviour application programming interface call graph

AAE Elhadi, MA Maarof, AH Osman - American Journal of Applied …, 2012 - Citeseer
Problem statement: A malware is a program that has malicious intent. Nowadays, malware
authors apply several sophisticated techniques such as packing and obfuscation to avoid …

Enhancing the detection of metamorphic malware using call graphs

AAE Elhadi, MA Maarof, BIA Barry, H Hamza - computers & security, 2014 - Elsevier
Malware stands for malicious software. It is software that is designed with a harmful intent. A
malware detector is a system that attempts to identify malware using Application …

A survey on applications of bipartite graph edit distance

M Stauffer, T Tschachtli, A Fischer, K Riesen - … -Based Representations in …, 2017 - Springer
About ten years ago, a novel graph edit distance framework based on bipartite graph
matching has been introduced. This particular framework allows the approximation of graph …

A similarity metric method of obfuscated malware using function-call graph

M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren… - Journal of Computer …, 2013 - Springer
Code obfuscating technique plays a significant role to produce new obfuscated malicious
programs, generally called malware variants, from previously encountered malwares …

[PDF][PDF] Windows api based malware detection and framework analysis

R Veeramani, N Rai - International conference on networks and cyber …, 2012 - Citeseer
Detection of zero day malware has been the great challenge for researchers from long time.
Traditional signature based antimalware scanners detect malware based on their unique …