[ACM Press the 46th Annual Southeast Regional Conference - Auburn, Alabama (2008.03.28-2008.03.29)] Proceedings of the 46th Annual Southeast Regional Conference on XX - ACM-SE 46 - A survey of data mining techniques for malware detection using file features
โ Scribed by Siddiqui, Muazzam; Wang, Morgan C.; Lee, Joohan
- Book ID
- 120837709
- Publisher
- ACM Press
- Year
- 2008
- Tongue
- English
- Weight
- 640 KB
- Category
- Article
- ISBN
- 1605581054
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Disassemblers generally assume that assembly language instructions do not overlap, therefore, an obvious obfuscation against such disassemblers is to overlap instructions. This is difficult to implement, however, as the number of instructions existing in a program which can be overlapped are typical
This research is part of a continuing effort to show the viability of using random projection as a feature extraction and reduction technique in the classification of malware to produce more accurate classifiers. In this paper, we use a vector space model with n-gram analysis to produce weighted fea