Detecting obfuscated malware using reduced opcode set and optimised runtime trace


Autoria(s): O'Kane, Philip; Sezer, Sakir; McLaughlin, Kieran
Data(s)

04/05/2016

Resumo

The research presented, investigates the optimal set of operational codes (opcodes) that create a robust indicator of malicious software (malware) and also determines a program’s execution duration for accurate classification of benign and malicious software. The features extracted from the dataset are opcode density histograms, extracted during the program execution. The classifier used is a support vector machine and is configured to select those features to produce the optimal classification of malware over different program run lengths. The findings demonstrate that malware can be detected using dynamic analysis with relatively few opcodes.

Formato

application/pdf

Identificador

http://pure.qub.ac.uk/portal/en/publications/detecting-obfuscated-malware-using-reduced-opcode-set-and-optimised-runtime-trace(755b589c-a657-4425-a563-f7428db2f18e).html

http://dx.doi.org/10.1186/s13388-016-0027-2

http://pure.qub.ac.uk/ws/files/35840401/Detecting.pdf

Idioma(s)

eng

Direitos

info:eu-repo/semantics/openAccess

Fonte

O'Kane , P , Sezer , S & McLaughlin , K 2016 , ' Detecting obfuscated malware using reduced opcode set and optimised runtime trace ' Security Informatics , vol 5 , no. 2 . DOI: 10.1186/s13388-016-0027-2

Tipo

article