dc.contributor | 資管評論 | |
dc.creator (作者) | Deshpande, Prasad | |
dc.creator (作者) | Stamp, Mark | |
dc.date (日期) | 2016-03 | |
dc.date.accessioned | 20-Nov-2019 16:00:32 (UTC+8) | - |
dc.date.available | 20-Nov-2019 16:00:32 (UTC+8) | - |
dc.date.issued (上傳時間) | 20-Nov-2019 16:00:32 (UTC+8) | - |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/127343 | - |
dc.description.abstract (摘要) | Previous work has shown that well-designed metamorphicmalware can evade many commonly-used malware detection techniques, including signature scanning. In this paper, we consider a previously developed score which is based on function call graph analysis. We test this score on challenging classes of metamorphic malware and we show that the resulting detection rates yield an improvement over other comparable techniques. These results indicate that the function call graph score is among the stronger malware scores developed to date. | |
dc.format.extent | 173 bytes | - |
dc.format.mimetype | text/html | - |
dc.relation (關聯) | 資管評論 MIS REVIEW : An International Journal, 21(1)&(2), 15-34 | |
dc.subject (關鍵詞) | Malware ; Function Call Graph ; Metamorphic Software | |
dc.title (題名) | Metamorphic Malware Detection Using Function Call Graph Analysis | |
dc.type (資料類型) | article | |