딥러닝을 이용한 악성코드탐지 연구동향 |
Choi, Sunoh
(한국전자통신연구원 정보보호연구본부 지능보안연구그룹)
Kim, Young Soo (한국전자통신연구원 정보보호연구본부 지능보안연구그룹) Kim, Jonghyun (한국전자통신연구원 정보보호연구본부 지능보안연구그룹) Kim, Ikkyun (한국전자통신연구원 정보보호연구본부 지능보안연구그룹) |
1 | Matthew G. Schultz, Eleazae Eskin, and Erez Zadok, "Data Mining Methods for Detection of New Malicious Executables," IEEE International Conference on Security and Privacy, 2001. |
2 | Manning C.D., Raghavan, P., Schutze, H., "An Introduction to Information Retrieval," Cambridge University Press, 2009 |
3 | Razvan Pascanu, Jack W. Stokes, Hermineh Sanossian, Mandy Marinescu, and Anil Thomas, "Malware Classification with Recurrent Networks," IEEE International Conference on Acoustics, Speech and Signal Processing, 2015 |
4 | Wenyi Huang and Jack W. Stokes, "MtNet: A Multi-Task Neural Network for Dynamic Malware Classification," International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2016 |
5 | Daesung Moon, Sung Bum Pan, and Ikkyun Kim, "Host-based intrusion detection system for secure human-centric computing," Journal of Supercomputing, 2016 |
6 | Daniel Gibert, "Convolutional Neural Networks for Malware Classification," Master Thesis, Universitat de Barcelona, 2016 |
7 | George E. Dahl, Jack W. Stokes, Li Deng, and Dong Yu, "Large-Scale Malware Classification using Random Projections and Neural Networks," IEEE International Conference on Acoustics, Speech and Signal Processing, 2013 |
8 | Li, P., Hastie, T.J., Church, K.W., "Very sparse random projections," ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ICDM), 2006 |
9 | Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R., "Dropout: A simple way to prevent neural networks from overfitting." J. Mach. Learn. Res., 2014 |
10 | Ulrich Bayer, Christopher Kruegel, and Engin Kirda, "TTAnalyze: A tool for analyzing malware," Annual Conference of the European Institute for Computer Antivirus Research (EICAR), 2006 |
11 | A. Moser, C. Kruegel, and E. Kirda, "Exploring multiple execution paths for malware analysis," IEEE Symposium on Security and Privacy, 2007 |
12 | Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean, "Distributed representations of words and phrases and their compositionality," Advamces om Neural Information Processing Systems, 2013 |
13 | https://www.kaggle.com/c/malware-classification |
14 | Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton, "Imagenet classification with deep convolutional neural networks," Advances in Neural Information Processing Systems, 2012 |
15 | L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath, "Malware Images: Visualization and Automatic Classification," ACM VizSec, 2011 |
16 | Aude Oliva and Antonio Torralba, "Modeling the shape of the scene: A holistic representation of the spatial envelope," International Journal of Computer Vision, 2001 |
17 | WannerCry randomware attack, https://en.wikipe dia.org/wiki/WannaCry_ransomware_attack |
18 | W. Xu, Y. Qi, D. Evans, "Automatically Evading Classifiers," Network and Distributed Systems Symposium, 2016 |