Acknowledgement
Supported by : 순천향대학교
References
- R. Lyda and J. Hamrock, "Using entropy analysis to find encrypted and packed malware", IEEE Security & Privacy, Vol. 5, No. 2, pp. 40-45, Apr. 2007.
- Microsoft. Microsoft PE and COFF Specification. Microsoft Corporation, Redmond, WA, revision 8.2, http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx. [Accessed: Jan. 01, 2010]
- T. Anselm and S. Arran, "Human-Readable Real-Time Classifications of Malicious Executables", Proceedings of the 10th Australian Information Security Management Conference, Dec. 2012.
- M. Z. Shafiq, S. M. Tabish, F. Mirza, and M. Farooq, "PE-Miner: Mining structural information to detect malicious executables in realtime", Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID ‟09), Berlin, Heidelberg, Springer-Verlag, pp. 121-141, Sep. 2009.
- M. Shafiq, S. Tabish, and M. Farooq, "PE-Probe: Leveraging Packer Detection and Structural Information to Detect Malicious Portable Executables", Proceedings of Virus Bulletin Conference, pp. 29-33, Jun. 2009.
- M. G. Schultz, E. Eskin, F. Zadok, and S. J. Stolfo, "Data mining methods for detection of new malicious executables", In: Security and Privacy, S&P 2001. Proceedings, IEEE Symposium on. IEEE, pp. 38-49, May 2001.
- J. Z. Kolter and M. A. Maloof, "Learning to detect malicious executables in the wild", Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining (KDD '04), Seattle, WA, USA. ACM Press. pp. 470-478, 2004.
- M. obert, F. lint, T. Nir, B. Eugene, G. Marina, D. Shlomi, and E. Yuval, "Unknown malcode detection using opcode representation", in Intelligence and Security Informatics, D. Ortiz-Arroyo, H. L. Larsen, D. D. Zeng,D. Hicks, and G. Wagner, Eds., Vol. 5376 of Lecture Notes in Computer Science, pp. 204-215, 2008.
- M. Robert, S. Dima, F. Clint, N. Nir, J. Nathalie, and E. Yuval, "Unknown malcode detection and the imbalance problem", Journal in Computer Virology, Vol. 5, No. 4, pp. 295-308, Jul. 2009. https://doi.org/10.1007/s11416-009-0122-8
- S. Asaf, M. Robert, F. Clint, D. Shlomi, and E. Yuval, "Detecting unknown malicious code by applying classification techniques on OpCode patterns", Security Informatics, Vol. 1, No. 1, pp. 1-22, Feb. 2012. https://doi.org/10.1186/2190-8532-1-1
- J. Bai, J. Wang, and G. Zou, "A Malware Detection Scheme Based on Mining Format Information", The Scientific World Journal, pp. 1-11, May 2014.
- Belaoued and Mazouzi, "A Real-Time PEMalware Detection System Based on CHI-Square Test and PE-File Features", International Conference on Computer Science and its Applications, IFIPAICT, Vol. 456, pp. 416-425, 2015. DOI: 10.1007/978-3-319-19578-0_34
- G. Yan, N. Brown, and D. Kong, "Exploring discriminatory features for automated malware classification", International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, LNCS 7967, pp. 41-61, Jul. 2013.
- J. I. Park, H. B. Park, and S. S. Lee, "Study on Automatic Analysis Method Based On Malware Behavior", Proceedings of KIIT Summer Conference, pp. 311-312, Jun. 2017.
- A. Baranovich, "VX Heavens", http://vx.netlux.org. [Accessed: Jan. 01, 2012]
- D. Quist, "Offensive computing", http://www.offensivecomputing.net. [Accessed: Jan. 01, 2012]
- J. Han and M. Kamber, "Data Mining: Concepts and Techniques", Morgan Kaufmann, 2nd edition. 2006.
- R. Perdisci, A. Lanzi, and W. Lee, "Classification of packed executables for accurate computer virus detection", Pattern Recognition Letters, Vol. 29, No. 4, pp. 1941-1946, Jun. 2008. https://doi.org/10.1016/j.patrec.2008.06.016
Cited by
- 악성코드 패킹유형 자동분류 기술 연구 vol.28, pp.5, 2018, https://doi.org/10.13089/jkiisc.2018.28.5.1119
- Real-time Linux Malware Detection Using Machine Learning vol.17, pp.7, 2018, https://doi.org/10.14801/jkiit.2019.17.7.111
- 악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발 vol.23, pp.5, 2018, https://doi.org/10.9717/kmms.2020.23.5.650
- ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files vol.12, pp.10, 2018, https://doi.org/10.3390/sym12101621