Authors
Orestis Kostakis, Joris Kinable, Hamed Mahmoudi, Kimmo Mustonen
Publication date
2011/3/21
Book
Proceedings of the 2011 ACM Symposium on Applied Computing
Pages
1516-1523
Description
The amount of suspicious binary executables submitted to Anti-Virus (AV) companies are in the order of tens of thousands per day. Current hash-based signature methods are easy to deceive and are inefficient for identifying known malware that have undergone minor changes. Examining malware executables using their call graphs view is a suitable approach for overcoming the weaknesses of hash-based signatures. Unfortunately, many operations on graphs are of high computational complexity. One of these is the Graph Edit Distance (GED) between pairs of graphs, which seems a natural choice for static comparison of malware. We demonstrate how Simulated Annealing can be used to approximate the graph edit distance of call graphs, while outperforming previous approaches both in execution time and solution quality. Additionally, we experiment with opcode mnemonic vectors to reduce the problem size …
Total citations
20112012201320142015201620172018201920202021202220233472527634523
Scholar articles
O Kostakis, J Kinable, H Mahmoudi, K Mustonen - Proceedings of the 2011 ACM Symposium on Applied …, 2011