A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Mining distinguishing patterns based on malware traces
2010
2010 3rd International Conference on Computer Science and Information Technology
The automatic generation of malicious behavior pattern based on system call trace is important to malware detection. This paper studied the existing generation method of malicious behavior specification. In order to reduce the complexity of pattern generation, it constructs graph which vertex label is unique, and uses these graphs to mine the pattern. To address the issue of limitation of the minimal contrast subgraph mining method, it uses multiple positive and negative samples, and proposes a
doi:10.1109/iccsit.2010.5565105
fatcat:f5brhxedxffqlgcbgw7ns5sayy