Constructing computer virus phylogenies
Journal of Algorithms
Classification of malware using structured control flow
AusPDC '10 Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing - Volume 107
Polymorphic worm detection using structural information of executables
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Hi-index | 0.00 |
The malware is not the strange word. As much again the threat and number of malware is raising. However we and vendors do not arrange these malwares. They store these malware. The reason is the number is so many and the detail analysis is impossible. Therefore some researchers or vendor implemented the behavior based analysis system. However, these systems just analyze malware and do not arrangement. Although there are some arrangement or detection algorithms, there are just results of paper and are not implemented. In this paper, we propose the more available algorithm. The proposed algorithm is the updated version of the CFG (Control Flow Graph) based algorithm.