307 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author임을규-
dc.date.accessioned2018-04-03T07:09:44Z-
dc.date.available2018-04-03T07:09:44Z-
dc.date.issued2014-10-
dc.identifier.citationProceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014. (Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014, 5 October 2014, p.236-241en_US
dc.identifier.isbn978-1-4503-3060-2-
dc.identifier.urihttps://dl.acm.org/citation.cfm?id=2664222-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/56989-
dc.description.abstractThe number of malware has sharply increased over years, and it caused various damages on computing systems and data. In this paper, we propose techniques to detect malware variants. Malware authors usually reuse malware modules when they generate new malware or malware variants. Therefore, malware variants have common code for some functions in their binary files. We focused on this common code in this research, and proposed the techniques to detect malware variants through similarity calculation of user-defined function. Since many malware variants evade malware detection system by transforming their static signatures, to cope with this problem, we applied pattern matching algorithms for DNA variations in Bioinformatics to similarity calculation of malware binary files. Since the pattern matching algorithm we used provides the local alignment function, small modification of functions can be overcome. Experimental results show that our proposed method can detect malware similarity and it is more resilient than other methods.en_US
dc.description.sponsorshipThis work was supported by the National Research Foundation of Korea(NRF) grant founded by the Korea government(MEST) (No.20110029924)en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machinery, Incen_US
dc.subjectmalware analysisen_US
dc.subjectsmith-waterman algorithmen_US
dc.subjectstatic analysisen_US
dc.titleSimilarity Calculation Method for User-Define Functions to Detect Malware Variantsen_US
dc.typeArticleen_US
dc.identifier.doi10.1145/2663761.2664222-
dc.relation.page1-10-
dc.contributor.googleauthorKim, TaeGuen-
dc.contributor.googleauthorPark, Jung Bin-
dc.contributor.googleauthorCho, In Gyeom-
dc.contributor.googleauthorKang, Boojoong-
dc.contributor.googleauthorIm, Eul Gyu-
dc.contributor.googleauthorKang, SooYong-
dc.relation.code20140083-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentDEPARTMENT OF COMPUTER SCIENCE-
dc.identifier.pidimeg-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE