About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II

Research Article

A Survey on Mining Program-Graph Features for Malware Analysis

Download(Requires a free EAI acccount)
317 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23802-9_18,
        author={Md. Islam and Md. Islam and A. Kayes and Chengfei Liu and Irfan Altas},
        title={A Survey on Mining Program-Graph Features for Malware Analysis},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II},
        proceedings_a={SECURECOMM},
        year={2015},
        month={12},
        keywords={Program graph Graph features Malware detection},
        doi={10.1007/978-3-319-23802-9_18}
    }
    
  • Md. Islam
    Md. Islam
    A. Kayes
    Chengfei Liu
    Irfan Altas
    Year: 2015
    A Survey on Mining Program-Graph Features for Malware Analysis
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23802-9_18
Md. Islam1,*, Md. Islam2,*, A. Kayes1,*, Chengfei Liu1,*, Irfan Altas2,*
  • 1: Swinburne University of Technology
  • 2: Charles Sturt University
*Contact email: mdsaifulislam@swin.edu.au, mislam@csu.edu.au, akayes@swin.edu.au, cliu@swin.edu.au, ialtas@csu.edu.au

Abstract

Malware, which is a malevolent software, mostly programmed by attackers for either disrupting the normal computer operation or gaining access to private computer systems. A malware detector determines the malicious intent of a program and thereafter, stops executing the program if the program is malicious. While a substantial number of various malware detection techniques based on static and dynamic analysis has been studied for decades, malware detection based on mining program graph features has attracted recent attention. It is commonly believed that graph based representation of a program is a natural way to understand its semantics and thereby, unveil its execution intent. This paper presents a state of the art survey on mining program-graph features for malware detection. We have also outlined the challenges of malware detection based on mining program graph features for its successful deployment, and opportunities that can be explored in the future.

Keywords
Program graph Graph features Malware detection
Published
2015-12-03
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-23802-9_18
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL