{"title":"Malware Variants Detection Using Behavior Destructive Features","authors":"Yongle Chen, Bingchu Jin, Dan Yu, Junjie Chen","doi":"10.1109/PAC.2018.00020","DOIUrl":null,"url":null,"abstract":"The variants of malware are a major threat to the security of computer systems. Millions of hosts on the Internet have been infected by malwares variants. Accurate detection of malware variants has become a key challenge for malware detection. The existing static detection is susceptible to file shelling and code obfuscation, while the dynamic detection is subject to anti-debugging and anti-virtual machine technology. Therefore, by combining the static and dynamic detection, we designed a malicious variants detection method based on behavior destructive features to analyze malicious samples.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PAC.2018.00020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The variants of malware are a major threat to the security of computer systems. Millions of hosts on the Internet have been infected by malwares variants. Accurate detection of malware variants has become a key challenge for malware detection. The existing static detection is susceptible to file shelling and code obfuscation, while the dynamic detection is subject to anti-debugging and anti-virtual machine technology. Therefore, by combining the static and dynamic detection, we designed a malicious variants detection method based on behavior destructive features to analyze malicious samples.