A Survey on Mining Program-Graph Features for Malware Analysis

Loading...
Thumbnail Image
File version

Accepted Manuscript (AM)

Author(s)
Islam, Md Saiful
Islam, Md Rafiqul
Kayes, ASM
Liu, Chengfei
Altas, Irfan
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Tian, J

Jing, J

Srivatsa, M

Date
2015
Size
File type(s)
Location

Beijing, China

License
Abstract

Malware, which is a malevolent software, mostly programmed by attackers for either disrupting the normal computer operation or gaining access to private computer systems. A malware detector determines the malicious intent of a program and thereafter, stops executing the program if the program is malicious. While a substantial number of various malware detection techniques based on static and dynamic analysis has been studied for decades, malware detection based on mining program graph features has attracted recent attention. It is commonly believed that graph based representation of a program is a natural way to understand its semantics and thereby, unveil its execution intent. This paper presents a state of the art survey on mining program-graph features for malware detection. We have also outlined the challenges of malware detection based on mining program graph features for its successful deployment, and opportunities that can be explored in the future.

Journal Title
Conference Title

International Conference on Security and Privacy in Communication Networks

Book Title
Edition
Volume

153

Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015. This is the author-manuscript version of this paper. Reproduced in accordance with the copyright policy of the publisher. The original publication is available at www.springerlink.com

Item Access Status
Note
Access the data
Related item(s)
Subject

Graph, social and multimedia data

Cybersecurity and privacy not elsewhere classified

Data mining and knowledge discovery

Persistent link to this record
Citation