Acknowledgement
Grant : 랜섬웨어 대응 기술 개발
Supported by : 정보통신기술진흥센터
References
- B. J. Kang, K. S. Han, B. H. Kang, and E. G. Im, "Malware Categorization Using Dynamic Mnemonic Frequency Analysis with Redundancy Filtering," Digital Investigation, Vol. 11, No. 4, pp. 323-335, Dec. 2014. https://doi.org/10.1016/j.diin.2014.06.003
- D. Sgandurra (2016, Sep 10). Automated Dynamic Analysis of Ransomware: Benefits, Limitations and Use for Detection [Online]. Available: https://arxiv.org (downloaded 2017, July. 12)
- Monika, P. Zavarsky, and D. Lindskog, "Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization," Procedia Computer Science, Vol. 94, No. 1, pp. 465-472, Aug. 2016. https://doi.org/10.1016/j.procs.2016.08.072
- M. Zhang, Y. Duan, H. Yin, and Z. Zhao, "Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs," Proc. of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1105-1116, 2014.
- Y. Park, D. Reeves, V. Mulukulta, and B. Sundaravel, "Fast Malware Classification by Automated Behavioral Graph Matching," Proc. of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1-4, 2010.
- L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, "Malware Images: Visualization and Automatic Classification," Proc. of the 8th International Symposium on Visualization for Cyber Security, pp. 1-7, 2011.
- J. Kinable, and O. Kostakis, "Malware classification based on call graph clustering," Journal in Computer Virology, Vol. 7, No. 4, pp. 233-245, Nov. 2011. https://doi.org/10.1007/s11416-011-0151-y
- B. J. Kang, T. G. Kim, H. J. Kwon, Y. S. Choi, and E. G. Im, "Malware classification method via binary content comparison," Proc. of the 2012 ACM Research in Applied Computation Symposium, pp. 316-321, 2012.
- P. O'Kane, S. Sezer, K. McLaughlin, and E. G. Im, "SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection," IEEE Transactions on Information Forensics and Security, Vol. 8, No. 3, pp. 500-509, Mar. 2013. https://doi.org/10.1109/TIFS.2013.2242890