In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequences mining techniques. We collect runtime instruction sequences from unknown executables and organize instruction sequences into basic blocks. We extract instruction sequence patterns based on three types of instruction associations within derived basic blocks. Following a data mining process, we perform feature extraction, feature selection and then build a classification model to learn instruction association patterns from both benign and malicious dataset automatically. By applying this classification model, we can predict the nature of an unknown program. We also build a program monitor which is able to capture runtime instruction sequence...
Traditional way to detect malicious software is based on signature matching. However, signature matc...
Internet worms pose a serious threat to computer security. Traditional approaches using signatures t...
Traditional way to detect malicious software is based on signature matching. However, signature matc...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
Malicious programs pose a serious threat to computer security. Traditional approaches using signatur...
Malicious programs pose a serious threat to computer security. Traditional approaches using signatur...
Malicious programs pose a serious threat to computer security. Traditional approaches using signatur...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
Internet worms pose a serious threat to computer security. Traditional approaches using signatures t...
Traditional way to detect malicious software is based on signature matching. However, signature matc...
Internet worms pose a serious threat to computer security. Traditional approaches using signatures t...
Traditional way to detect malicious software is based on signature matching. However, signature matc...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
In this paper, we describe a program monitor which is able to capture runtime instruction sequences ...
Malicious programs pose a serious threat to computer security. Traditional approaches using signatur...
Malicious programs pose a serious threat to computer security. Traditional approaches using signatur...
Malicious programs pose a serious threat to computer security. Traditional approaches using signatur...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
Internet worms pose a serious threat to computer security. Traditional approaches using signatures t...
Traditional way to detect malicious software is based on signature matching. However, signature matc...
Internet worms pose a serious threat to computer security. Traditional approaches using signatures t...
Traditional way to detect malicious software is based on signature matching. However, signature matc...