3 Citations (Scopus)

Abstract

Malware, which is a malevolent software, mostly programmed by attackers for either disrupting the normal computer operation or gaining access to private computer systems. A malware detector determines the malicious intent of a program and thereafter, stops executing the program if the program is malicious. While a substantial number of various malware detection techniques based on static and dynamic analysis has been studied for decades, malware detection based on mining program graph features has attracted recent attention. It is commonly believed that graph based representation of a program is a natural way to understand its semantics and thereby, unveil its execution intent. This paper presents a state of the art survey on mining program-graph features for malware detection. We have also outlined the challenges of malware detection based on mining program graph features for its successful deployment, and opportunities that can be explored in the future.
Original languageEnglish
Title of host publicationInternational Conference on Security and Privacy in Communication Networks
Subtitle of host publication10th International ICST Conference, SecureComm 2014 Beijing, China, September 24–26, 2014 Revised Selected Papers, Part II
Place of PublicationBelgium
PublisherInstitute for Computer Sciences, Social Informatics and Telecommunications Engineering
Pages220-236
Number of pages17
Volume153
DOIs
Publication statusPublished - 2014
EventInternational Conference on Security and Privacy in Communication Networks - Beijing, China, China
Duration: 24 Sept 201426 Sept 2014
https://securecomm.eai-conferences.org/2014/index.html

Workshop

WorkshopInternational Conference on Security and Privacy in Communication Networks
Country/TerritoryChina
Period24/09/1426/09/14
Internet address

Fingerprint

Dive into the research topics of 'A survey on mining program-graph features for malware analysis'. Together they form a unique fingerprint.

Cite this