In software engineering contexts software may be compared for similarity in order to detect duplicate code that indicates poor design, and to reconstruct evolution history. Malicious software, being nothing other than a particular type of software, can also be compared for similarity in order to detect commonalities and evolution history. This paper provides a brief introduction to the issue of measuring similarity between malicious programs, and how evolution is known to occur in the area. It then uses this review to try to draw lines that connect research in software engineering (e.g., on "clone detection") to problems in anti-malware research
In modern software engineering, researchers regard a software system as an organic life form that mu...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
Software clone detection is very promising and innovative within the industryfield. Existing mainstr...
In software engineering contexts software may be compared for similarity in order to detect duplicat...
Software similarity and classification is an emerging topic with wide applications. It is applicable...
<p>Software security is a big data problem. The volume of new software artifacts created far outpace...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Malware authors are known to reuse existing code, this development process results in software evolu...
The vast majority of work on comparing program similarities to detect software piracy either assumes...
An overview of the concept of program similarity is presented. It divides similarity into two types...
This report summarizes my overview talk on software clone detection research. It first discusses the...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Malware classification, specifically the task of grouping malware samples into families according to...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
In modern software engineering, researchers regard a software system as an organic life form that mu...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
Software clone detection is very promising and innovative within the industryfield. Existing mainstr...
In software engineering contexts software may be compared for similarity in order to detect duplicat...
Software similarity and classification is an emerging topic with wide applications. It is applicable...
<p>Software security is a big data problem. The volume of new software artifacts created far outpace...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Malware authors are known to reuse existing code, this development process results in software evolu...
The vast majority of work on comparing program similarities to detect software piracy either assumes...
An overview of the concept of program similarity is presented. It divides similarity into two types...
This report summarizes my overview talk on software clone detection research. It first discusses the...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
Malware classification, specifically the task of grouping malware samples into families according to...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
In modern software engineering, researchers regard a software system as an organic life form that mu...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
Software clone detection is very promising and innovative within the industryfield. Existing mainstr...