Development of a Performance Evaluation Model on Similarity Measurement Method of Malware
![]() |
Chu, Sung-Taek
(공주대학교 융합과학과)
Kim, HeeSeok (한국과학기술정보연구원 과학기술사이버안전센터) Im, Kwang-Hyuk (배재대학교 전자상거래학과) Kim, Kyu-Il (한국과학기술정보연구원 과학기술사이버안전센터) Seo, Chang-Ho (공주대학교 융합과학과) |
1 | M. Bailey, J. Oberheide, J. Andersen, and Z. M. Mao, "Automated classification and analysis of Internet malware," RAID 2007, LNCS 4637, Springer-Verlag, pp.178-197, 2007. |
2 | K. Rieck, T. Holz, C.Willems, P. Dussel, and P. Laskov, "Learning and classification of malware behavior," DIMVA 2008, LNCS 5137, Springer-Verlag, pp.108-125, 2008. |
3 | J. Nakazato, J. Song, M. Eto, D. Inoue, and K. Nakao, "A novel malware clustering method using frequency of function call traces in parallel threads," IEICE Trans. on Inf. And Syst., Vol.E94-D, No.11, pp.2150-2158, 2011. DOI |
4 | K. Iwamoto and K. Wasaki, "Malware Classification based on Extracted API Sequences using Static Analysis," AINTEC 2012, ACM, pp.31-38, 2012. |
5 | V. P., H. Jain, Y. K. Golecha, M. S. Gaur, and V. Laxmi, "Medusa: MEtamorphic Malware Dynamic Analysis Using Signature from API," SIN 2010, ACM, pp.263-269, 2010. |
6 | http://www.opswat.com/about/media/reports/antivirus-january-2014 |
7 | 김성환, 조환규, "PAM 행렬 모델을 이용한 음소간 유사도 자동 계산 기법", 한국콘텐츠학회논문지, 제12권, 제3호, pp.34-43, 2012. |
8 | http://www.cuckoosandbox.org/ |
9 | 유주원, 김종원, 최종욱, 배경율, "개선된 비디오 장면 유사도 검출 알고리즘", 한국콘텐츠학회논문지, 제9권, 제2호, pp.43-50, 2009. 과학기술학회마을 DOI ScienceOn |
![]() |