MutantX-S: Scalable Malware Clustering Based on Static Features
暂无分享,去创建一个
Kang G. Shin | Sandeep Bhatkar | Xin Hu | Kent Griffin | K. Shin | Kent Griffin | X. Hu | S. Bhatkar | Xin Hu
[1] David Brumley,et al. BitShred: feature hashing malware for scalable triage and semantic analysis , 2011, CCS '11.
[2] Jason Raber,et al. Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation , 2007, 14th Working Conference on Reverse Engineering (WCRE 2007).
[3] Tzi-cker Chiueh,et al. A Study of the Packer Problem and Its Solutions , 2008, RAID.
[4] Teofilo F. GONZALEZ,et al. Clustering to Minimize the Maximum Intercluster Distance , 1985, Theor. Comput. Sci..
[5] D. Ruppert. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .
[6] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[7] Sergei Vassilvitskii,et al. How slow is the k-means method? , 2006, SCG '06.
[8] Marius Gheorghescu. AN AUTOMATED VIRUS CLASSIFICATION SYSTEM , 2006 .
[9] Nello Cristianini,et al. Kernel Methods for Pattern Analysis , 2003, ICTAI.
[10] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[12] John Langford,et al. Hash Kernels , 2009, AISTATS.
[13] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[14] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[15] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..
[16] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[17] Saumya K. Debray,et al. Deobfuscation: reverse engineering obfuscated code , 2005, 12th Working Conference on Reverse Engineering (WCRE'05).
[18] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[19] Andrew Walenstein,et al. Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.
[20] Rich Caruana,et al. Multitask Learning , 1997, Machine Learning.
[21] Christopher Krügel,et al. Static Disassembly of Obfuscated Binaries , 2004, USENIX Security Symposium.
[22] Kilian Q. Weinberger,et al. Feature hashing for large scale multitask learning , 2009, ICML '09.
[23] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[24] Georg Wicherski,et al. peHash: A Novel Approach to Fast Malware Clustering , 2009, LEET.