Opcodes histogram for classifying metamorphic portable executables malware
Malware writers attempt to generate different shapes of a malware to evade the signature-based scanners. As the number of variants of a metamorphic malware is increased, the analysis of all variants and selecting the appropriate signature and updating the database of the antivirus becomes more tires...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2012
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/34159/ http://ieeexplore.ieee.org/document/6333411/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|