Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint Clustering

Author(s):  
Zhao Xiaolin ◽  
Zhang Yiman ◽  
Li Xuhui ◽  
Chen Quanbao
Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 35
Author(s):  
Sungjoong Kim ◽  
Seongkyu Yeom ◽  
Haengrok Oh ◽  
Dongil Shin ◽  
Dongkyoo Shin

The development of information and communication technology (ICT) is making daily life more convenient by allowing access to information at anytime and anywhere and by improving the efficiency of organizations. Unfortunately, malicious code is also proliferating and becoming increasingly complex and sophisticated. In fact, even novices can now easily create it using hacking tools, which is causing it to increase and spread exponentially. It has become difficult for humans to respond to such a surge. As a result, many studies have pursued methods to automatically analyze and classify malicious code. There are currently two methods for analyzing it: a dynamic analysis method that executes the program directly and confirms the execution result, and a static analysis method that analyzes the program without executing it. This paper proposes a static analysis automation technique for malicious code that uses machine learning. This classification system was designed by combining a method for classifying malicious code using a portable executable (PE) structure and a method for classifying it using a PE structure. The system has 98.77% accuracy when classifying normal and malicious files. The proposed system can be used to classify various types of malware from PE files to shell code.


2021 ◽  
Author(s):  
Bingtao Gao ◽  
Lei Wang ◽  
Zhengang Zhai ◽  
Yuan Chen ◽  
Jiangang Wang

Planta Medica ◽  
2007 ◽  
Vol 73 (09) ◽  
Author(s):  
C Chrubasik ◽  
T Maier ◽  
M Luond ◽  
A Schieber

Sign in / Sign up

Export Citation Format

Share Document