Malware Analysis Using Visualized Image Matrices
نویسندگان
چکیده
منابع مشابه
Malware Analysis Using Visualized Image Matrices
This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images. The proposed method generates RGB-colored pixels on image matrices using the opcode sequences extracted from malware samples and calculates the similarities for the image matrices. Particularl...
متن کاملMalware Image Analysis and Classification using Support Vector Machine
The malware is one of the major concerns in computer and cyber security. The availability of various malware toolkits and internet popularity that has led to the increase in number of malware attacks day to day. Comparing with existing framework of antivirus scanners they currently used signature based a malware detection technique which is widely. In this paper, we propose an efficient framewo...
متن کاملImpeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers discover code guarded by triggers via multiple path exploration, symbolic execution, or forced conditional execution, all without knowing the trigger inputs. We present a malware obfuscation technique that automatically ...
متن کاملMalware Similarity Analysis using API Sequence Alignments
Malware variants could be defined as malware that have similar malcious behavior. In this paper, a sequence alignment method, the method widely used in Bioinformatics, was used to detect malware variants. This method can find the common parts of Malware’s API call sequences, and these common API call sequences can be used to detect similar behaviors of malware variants. However, when a sequence...
متن کاملActive malware analysis using stochastic games
Cyber security is increasingly important for defending computer systems from loss of privacy or unauthorised use. One important aspect is threat analysis — how does an attacker infiltrate a system and what do they want once they are inside. This paper considers the problem of Active Malware Analysis, where we learn about the human or software intruder by actively interacting with it with the go...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Scientific World Journal
سال: 2014
ISSN: 2356-6140,1537-744X
DOI: 10.1155/2014/132713