과제정보
연구 과제 주관 기관 : 정보통신산업진흥원
참고문헌
- Malware statistics, Available: http://www.av-test.org/en/statistics/malware/
- E. Gandotra, D. Bansal, S. Sofat, "Malware Analysis and Classification: A Survey," Journal of Information Security 2014, Vol. 5, No. 2, pp. 9, 2014.
- Y. Park, D. Reeves, V. Mulukutla, B. Sundaravel, "Fast malware classification by automated behavioral graph matching," Proc. of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 45, 2010.
- S. Cesare, Y. Xiang, "A fast flowgraph based classification system for packed and polymorphic malware on the endhost," Proc. of Advanced Information Networking and Applications, pp. 721-728, 2010.
- K. Raman, "Selecting features to classify malware," Proc. of InfoSec Southwest, 2012.
- Q. Jiang, X. Zhao, K. Huang, "A feature selection method for malware detection," Proc. of 2011 IEEE International Conference on Information and Automation, pp. 890-895, 2011.
- G. E. Dahl, J. W. Stokex, L. Deng, D. Yu, "Largescale malware classification using random projections and neural networks," Proc. of 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3422-3426. 2013.
- R. Tian, L. Batten, R. Islam, S. Versteeg, "An automated classification system based on the strings of trojan and virus families," Proc. of 2009 4th International Conference on Malicious and Unwanted Software, pp. 23-30, 2009.
- K. Rieck, T. Holz, C. Willems, P. Düssel, P. Laskov, "Learning and classification of malware behavior," Proc. of 5th International Conference, Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 108-125, 2008.
- D. Bilar, "Opcodes as predictor for malware," Journal of Electronic Security and Digital Forensics, Vol. 1, No. 2, pp. 156-168, 2007. https://doi.org/10.1504/IJESDF.2007.016865
- K. S. Han, B. Kang, E. G. Im, "Malware classification using instruction frequencies," Proc. of the 2011 ACM Symposium on Research in Applied Computation, pp. 298-300, 2011.
- P. O'Kane, S. Sezer, K. McLaughlin, E. G. Im, "SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection," Journal of IEEE transactions on information forensics and security, Vol. 8, No. 3, pp. 500-509, Mar. 2013. https://doi.org/10.1109/TIFS.2013.2242890
- B. B. Rad, M. Masrom, S. Ibrahim, "Opcodes histogram for classifying metamorphic portable executables malware," Proc. of 2012 International Conference on e-Learning and e-Technologies in Education, pp. 209-213, 2012.
- M. Alazab, M. A. Kadiri, S. Venkatraman, A. Al-Nemrat, "Malicious Code Detection Using Penalized Splines on OPcode Frequency," Proc. of 2012 Third Cybercrime and Trustworthy Computing Workshop, pp. 38-47, 2012.
- PE format, Available: http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx
- I. Santos, F. Brezo, J. Nieves, Y. K. Penya, B. Sanz, C. Laorden, P. G. Bringas, "Idea: Opcode-sequencebased malware detection," Proc. of Second International Symposium on Engineering Secure Software and Systems, pp. 35-43, 2010.
- I. Guyon, J. Weston, S. Barnhill, V. Vapnik, "Gene selection for cancer classification using support vector machines," Journal of Machine learning, Vol. 46, No. 1-3, pp. 389-422, Fab. 2002. https://doi.org/10.1023/A:1012487302797
- Weka, Available: http://www.cs.waikato.ac.nz/ml/weka/
- VXheaven, Available: http://vxheavens.com/
- K. Rieck, T. Holz, C. Willems, P. Dussel, P. Laskov, "Learning and classification of malware behavior," Proc. of 5th International Conference, Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 108-125, 2008.
- M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, J. Nazario, "Automated classification and analysis of internet malware," Proc. of 10th International Symposium, Recent Advances in Intrusion Detection, pp. 178-197, 2007.
- M. Z. Shafiq, S. M. Tabish, M. Farooq, "Are evolutionary rule learning algorithms appropriate for malware detection?" Proc. of the 11th Annual conference on Genetic and evolutionary computation, pp. 1915-1916, 2009.
- R. Tian, L. M.Batten, S. C. Versteeg, "Function length as a tool for malware classification," Proc. of 2008 3rd International Conference on Malicious and Unwanted Software, pp. 69-76, 2008.
- V. Moonsamy, R. Tian, L. Batten, "Feature reduction to speed up malware classification," Proc. of the 16th Nordic Conference on Information Security Technology for Applications, ser. NordSec'11, pp. 176-188, 2012.