This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary concern in cybersecurity, being one of the attacker's favorite cyberweapons. Over time, malware evolves not only in complexity but also in diversity and quantity. Malware analysis automation is thus crucial. In this paper we present ECDGs, a shorter call graph representation, and a new similarity function that is accurate and robust. Toward this goal, we revisit some principles of malware analysis research to define basic primitives and an evaluation paradigm addressed for the setup of more reliable experiments. Our benchmark shows that our similarity function is very efficient in practice, achieving speedup rates of 3.30x and 354, 11x wrt. rad...
We identify a new method for detecting malware within a network that can be processed in linear time...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
The authors received the price of Best Paper Award IWCC 2021 for this presentation performed in the ...
\u3cp\u3eEach day, anti-virus companies receive tens of thousands samples of potentially harmful exe...
Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of ...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
A major challenge of the anti-virus (AV) industry is how to ef-fectively process the huge influx of ...
We identify a new method for detecting malware within a network that can be processed in linear time...
We identify a new method for detecting malware within a network that can be processed in linear time...
Recently, some graph-based methods have been proposed for malware detection. However, current malwar...
We identify a new method for detecting malware within a network that can be processed in linear time...
Malware undoubtedly have become a major threat in modern society and their numbers are growing daily...
We identify a new method for detecting malware within a network that can be processed in linear time...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
The authors received the price of Best Paper Award IWCC 2021 for this presentation performed in the ...
\u3cp\u3eEach day, anti-virus companies receive tens of thousands samples of potentially harmful exe...
Each day, anti-virus companies receive large quantities of potentially harmful executables. Many of ...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
A major challenge of the anti-virus (AV) industry is how to ef-fectively process the huge influx of ...
We identify a new method for detecting malware within a network that can be processed in linear time...
We identify a new method for detecting malware within a network that can be processed in linear time...
Recently, some graph-based methods have been proposed for malware detection. However, current malwar...
We identify a new method for detecting malware within a network that can be processed in linear time...
Malware undoubtedly have become a major threat in modern society and their numbers are growing daily...
We identify a new method for detecting malware within a network that can be processed in linear time...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Malware is a major security threat confronting computer systems and networks and has increased in sc...