Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 임을규 | - |
dc.date.accessioned | 2018-04-03T07:09:44Z | - |
dc.date.available | 2018-04-03T07:09:44Z | - |
dc.date.issued | 2014-10 | - |
dc.identifier.citation | Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014. (Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014, 5 October 2014, p.236-241 | en_US |
dc.identifier.isbn | 978-1-4503-3060-2 | - |
dc.identifier.uri | https://dl.acm.org/citation.cfm?id=2664222 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11754/56989 | - |
dc.description.abstract | The number of malware has sharply increased over years, and it caused various damages on computing systems and data. In this paper, we propose techniques to detect malware variants. Malware authors usually reuse malware modules when they generate new malware or malware variants. Therefore, malware variants have common code for some functions in their binary files. We focused on this common code in this research, and proposed the techniques to detect malware variants through similarity calculation of user-defined function. Since many malware variants evade malware detection system by transforming their static signatures, to cope with this problem, we applied pattern matching algorithms for DNA variations in Bioinformatics to similarity calculation of malware binary files. Since the pattern matching algorithm we used provides the local alignment function, small modification of functions can be overcome. Experimental results show that our proposed method can detect malware similarity and it is more resilient than other methods. | en_US |
dc.description.sponsorship | This work was supported by the National Research Foundation of Korea(NRF) grant founded by the Korea government(MEST) (No.20110029924) | en_US |
dc.language.iso | en | en_US |
dc.publisher | Association for Computing Machinery, Inc | en_US |
dc.subject | malware analysis | en_US |
dc.subject | smith-waterman algorithm | en_US |
dc.subject | static analysis | en_US |
dc.title | Similarity Calculation Method for User-Define Functions to Detect Malware Variants | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1145/2663761.2664222 | - |
dc.relation.page | 1-10 | - |
dc.contributor.googleauthor | Kim, TaeGuen | - |
dc.contributor.googleauthor | Park, Jung Bin | - |
dc.contributor.googleauthor | Cho, In Gyeom | - |
dc.contributor.googleauthor | Kang, Boojoong | - |
dc.contributor.googleauthor | Im, Eul Gyu | - |
dc.contributor.googleauthor | Kang, SooYong | - |
dc.relation.code | 20140083 | - |
dc.sector.campus | S | - |
dc.sector.daehak | COLLEGE OF ENGINEERING[S] | - |
dc.sector.department | DEPARTMENT OF COMPUTER SCIENCE | - |
dc.identifier.pid | imeg | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.