Y Ding, X Xia, S Chen, Y Li - Computers & Security, 2018 - Elsevier
Graph-based malware detection methods must build a behavior graph for each known malware, and they are difficult to apply in practice. To solve this issue, we study how to build …
M Bourquin, A King, E Robbins - Proceedings of the 2nd ACM SIGPLAN …, 2013 - dl.acm.org
As the volume of malware inexorably rises, comparison of binary code is of increasing importance to security analysts as a method of automatically classifying new malware …
M Hassen, PK Chan - Proceedings of the Seventh ACM on Conference …, 2017 - dl.acm.org
In an attempt to preserve the structural information in malware binaries during feature extraction, function call graph-based features have been used in various research works in …
With the rapid emergence of graph representation learning, the construction of new large- scale datasets is necessary to distinguish model capabilities and accurately assess the …
Problem statement: A malware is a program that has malicious intent. Nowadays, malware authors apply several sophisticated techniques such as packing and obfuscation to avoid …
Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application …
About ten years ago, a novel graph edit distance framework based on bipartite graph matching has been introduced. This particular framework allows the approximation of graph …
M Xu, L Wu, S Qi, J Xu, H Zhang, Y Ren… - Journal of Computer …, 2013 - Springer
Code obfuscating technique plays a significant role to produce new obfuscated malicious programs, generally called malware variants, from previously encountered malwares …
R Veeramani, N Rai - International conference on networks and cyber …, 2012 - Citeseer
Detection of zero day malware has been the great challenge for researchers from long time. Traditional signature based antimalware scanners detect malware based on their unique …