The number of malware has sharply increased over years, and it caused various damages on computing systems and data. In this paper, we propose techniques to detect malware variants. Malware authors usually reuse malware modules when they generate new malware or malware variants. Therefore, malware variants have common code for some functions in their binary files. We focused on this common code in this research, and proposed the techniques to detect malware variants through similarity calculation of user-defined function. Since many malware variants evade malware detection system by transforming their static signatures, to cope with this problem, we applied pattern matching algorithms for DNA variations in Bioinformatics to similarity calcu...
Nowadays, computer software is an essential part in our lives and is used in various fields. While s...
Static detection of malware variants plays an important role in system security and control flow has...
Finding changed and similar functions between a pair of binaries is an important problem in malware ...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
With the increased uses of the Internet, the number of newly found malware keeps increasing every ye...
This paper proposes a method to calculate similarities of software without any source code informati...
Malware authors are known to reuse existing code, this development process results in software evolu...
Modern antivirus systems (AVSs) are not able to detect new polymorphic malware variants until they e...
Modern antivirus systems (AVSs) are not able to detect new polymorphic malware variants until they e...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Static detection of polymorphic malware variants plays an important role to improve system security....
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Nowadays, computer software is an essential part in our lives and is used in various fields. While s...
Static detection of malware variants plays an important role in system security and control flow has...
Finding changed and similar functions between a pair of binaries is an important problem in malware ...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
With the increased uses of the Internet, the number of newly found malware keeps increasing every ye...
This paper proposes a method to calculate similarities of software without any source code informati...
Malware authors are known to reuse existing code, this development process results in software evolu...
Modern antivirus systems (AVSs) are not able to detect new polymorphic malware variants until they e...
Modern antivirus systems (AVSs) are not able to detect new polymorphic malware variants until they e...
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle ...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Static detection of polymorphic malware variants plays an important role to improve system security....
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Nowadays, computer software is an essential part in our lives and is used in various fields. While s...
Static detection of malware variants plays an important role in system security and control flow has...
Finding changed and similar functions between a pair of binaries is an important problem in malware ...