\u3cp\u3eThe amount of suspicious binary executables submitted to Anti-Virus (AV) companies are in the order of tens of thousands per day. Current hash-based signature methods are easy to deceive and are inefficient for identifying known malware that have undergone minor changes. Examining malware executables using their call graphs view is a suitable approach for overcoming the weaknesses of hash-based signatures. Unfortunately, many operations on graphs are of high computational complexity. One of these is the Graph Edit Distance (GED) between pairs of graphs, which seems a natural choice for static comparison of malware. We demonstrate how Simulated Annealing can be used to approximate the graph edit distance of call graphs, while outper...
Malicious Windows executables still constitute one of the major threats to computer security. Variou...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...
Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of ...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
\u3cp\u3eEach day, anti-virus companies receive tens of thousands samples of potentially harmful exe...
Static detection of polymorphic malware variants plays an important role to improve system security....
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
The authors received the price of Best Paper Award IWCC 2021 for this presentation performed in the ...
We propose a malware classification system that is shown to be robust to some common intra-procedura...
A major challenge of the anti-virus (AV) industry is how to ef-fectively process the huge influx of ...
We propose a malware classification system that is shown to be robust to some common intra-procedura...
Static detection of malware variants plays an important role in system security and control flow has...
Malicious Windows executables still constitute one of the major threats to computer security. Variou...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...
Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of ...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
\u3cp\u3eEach day, anti-virus companies receive tens of thousands samples of potentially harmful exe...
Static detection of polymorphic malware variants plays an important role to improve system security....
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
The authors received the price of Best Paper Award IWCC 2021 for this presentation performed in the ...
We propose a malware classification system that is shown to be robust to some common intra-procedura...
A major challenge of the anti-virus (AV) industry is how to ef-fectively process the huge influx of ...
We propose a malware classification system that is shown to be robust to some common intra-procedura...
Static detection of malware variants plays an important role in system security and control flow has...
Malicious Windows executables still constitute one of the major threats to computer security. Variou...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...