Authors
Joris Kinable, Orestis Kostakis
Publication date
2011/11
Journal
Journal in computer virology
Volume
7
Issue
4
Pages
233-245
Publisher
Springer-Verlag
Description
Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based on call graph clustering. By representing malware samples as call graphs, it is possible to abstract certain variations away, enabling the detection of structural similarities between samples. The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. To compare call graphs mutually, we compute pairwise graph similarity scores via graph matchings which approximately minimize the graph edit distance. Next, to facilitate the …
Total citations
201120122013201420152016201720182019202020212022202320247919221621302432373018148
Scholar articles