The goal of this master thesis was to design an algorithm that will be able to measure the difference between two programs based on their behavioral description. For the algorithm needs, the Levenshtein distance method between two strings and NCD method, were used. Both methods have their implementation approach and test result described. This term also discusses various methods of program analysis in virtual machine environment, as well as explanation of some basic concepts regarding malware analysis
Most of systems for plagiarism detection within a set of source codes is based on sequential compari...
This paper proposes a method to calculate similarities of software without any source code informati...
We describe the design and implementation of a program called sim to measure similarity between two ...
Software similarity and classification is an emerging topic with wide applications. It is applicable...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
The number of malware has sharply increased over years, and it caused various damages on computing s...
The algorithm of pattern mining from sequences of system calls is described. Patterns are used for p...
We present a methodology for performing automatic extraction of behavioral features from test progra...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...
The world is full of programs. More are written every day, and so the corpus of written code is ever...
Abstract—A fundamental question in information theory and in com-puter science is how to measure sim...
This paper proposes a new method of the malicious code classification based on statistical analysis ...
In software engineering contexts software may be compared for similarity in order to detect duplicat...
An overview of the concept of program similarity is presented. It divides similarity into two types...
Most of systems for plagiarism detection within a set of source codes is based on sequential compari...
This paper proposes a method to calculate similarities of software without any source code informati...
We describe the design and implementation of a program called sim to measure similarity between two ...
Software similarity and classification is an emerging topic with wide applications. It is applicable...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
The number of malware has sharply increased over years, and it caused various damages on computing s...
The algorithm of pattern mining from sequences of system calls is described. Patterns are used for p...
We present a methodology for performing automatic extraction of behavioral features from test progra...
A measurement for how similar (or distant) two computer programs are has a wide range of possible ap...
The world is full of programs. More are written every day, and so the corpus of written code is ever...
Abstract—A fundamental question in information theory and in com-puter science is how to measure sim...
This paper proposes a new method of the malicious code classification based on statistical analysis ...
In software engineering contexts software may be compared for similarity in order to detect duplicat...
An overview of the concept of program similarity is presented. It divides similarity into two types...
Most of systems for plagiarism detection within a set of source codes is based on sequential compari...
This paper proposes a method to calculate similarities of software without any source code informati...
We describe the design and implementation of a program called sim to measure similarity between two ...