Acknowledgement
Supported by : 한국연구재단
References
- M. Egele, T Scholte, E. Kirda, and C. Kruegel, "A Survey on Automated Dynamic Malware-Analysis Techniques and Tools," ACM Computing Surveys (CSUR), Vol. 44, No. 2, pp. 1-42, Feb. 2012.
- Y. Qiao, Y. Yang, and L. Ji, J. He, "Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences," 2013 12th IEEE International Conference on. IEEE, pp. 265-270, 2013.
- D. Veerwal and P. Menaria, "Ensemble of Soft Computing Techniques for Malware detection," International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), Vol. 6, No. 2, pp. 159-167, Sep.-Nov. 2013.
- K.S. Han, I. K. Kim, and E. G. Im, "Malware Classification Methods Using API Sequence Characteristics," Proc. of the International Conference on IT Convergence and Security 2011 Lecture Notes in Electrical Engineering, Vol. 120, pp. 613-626, 2012.
- K. S. Han, I. K. Kim, and E. G. Im, "Detection Methods for Malware Variant Using API Call Related Graphs," Proc. of the International Conference on IT Convergence and Security 2011 Lecture Notes in Electrical Engineering, Vol. 120, pp. 607-611, 2012.
- B. Kang, T. Kim, H. Kwon, Y. Choi, and E. G. Im, "Malware Classification Method via Binary Content Comparison," Proc. RACS '12 Proceedings of the 2012 ACM Research in Applied Computation Symposium, pp. 316-321, 2012.
- K. S. Han, B. Kang, and E. G. Im, "Malware Classification using Instruction Frequencies," Proc. RACS '11 Proceedings of the 2011 ACM Symposium on Research in Applied Computation, pp. 298-300, 2011.
- K. S. Han, B. Kang, H. Kwon, B. Li, and E. G. Im, "Virus Classification via Instruction Frequency," Proc. of the Fourth Joint Workshop between HYU and BUPT, Oct. 2011.
- K. S. Han, S. Kim, and E. G. Im, "Instruction Frequency-based Malware Classification Method," International Information Institute(Tokyo) Information, Vol. 15, No. 7, 2012.
- B. Kang, H. S. Kim, T. Kim, H. Kwon, and E. G. Im, "Fast Malware Classification using Counting Bloom Filter," INFORMATION-An International Interdisciplinary Journal, Vol. 15, No. 7, Jul. 2012.
- T. F. Smith and M. S. Waterman, "Identification of Common Molecular Subsequences," Journal of Molecular Biology, Vol. 147, No. 1, pp. 195-197, Mar. 1981. https://doi.org/10.1016/0022-2836(81)90087-5
- S. B. Needleman and C. D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins," Journal of Molecular Biology, Vol. 48, No. 3, pp. 443-453, Mar. 1970. https://doi.org/10.1016/0022-2836(70)90057-4
- J, Cohen, "Bioinformatics-an introduction for computer scientists," ACM Computing Surveys (CSUR), Vol. 36, No. 2, pp. 122-158, Jun. 2004. https://doi.org/10.1145/1031120.1031122
- S. F. Altschul, W. Gish, W. Miller, E. W. Myers, D. J. Lipman, "Basic local alignment search tool," Journal of molecular biology, Vol. 215, No. 3, pp. 403-410, Oct. 1990. https://doi.org/10.1016/S0022-2836(05)80360-2
- Cuckoo Sandbox. [Online] Available: http://cuckoosandbox.org/