Presentation 2016-11-25
Study of behavior each malware function from the API calls
Nobuki Suetsugu, Masaki Hashimoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much technique is suggested about the detection by similarity with the known malware behavior. In the detection using classification method, though it is an important item for the selection of parameters for characterizing the behavior and the classification technique which take in the parameter that improve the detection rate, most of the studies on the individual parameters itself are not done. This study shows feature of every malware family with their behavior and views the parameter selections.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Malware / classification / Behavior analysis / Parameter
Paper # ICSS2016-40
Date of Issue 2016-11-18 (ICSS)

Conference Information
Committee ICSS
Conference Date 2016/11/25(1days)
Place (in Japanese) (See Japanese page)
Place (in English) Institute of Information Security
Topics (in Japanese) (See Japanese page)
Topics (in English) Information and Communication System Security, etc.
Chair Yutaka Miyake(KDDI R&D Labs.)
Vice Chair Yoshiaki Shiraishi(Kobe Univ.) / Takeshi Ueda(Mitsubishi Electric)
Secretary Yoshiaki Shiraishi(NII) / Takeshi Ueda(Yokohama National Univ.)
Assistant Kazunori Kamiya(NTT) / Takahiro Kasama(NICT)

Paper Information
Registration To Technical Committee on Information and Communication System Security
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Study of behavior each malware function from the API calls
Sub Title (in English)
Keyword(1) Malware
Keyword(2) classification
Keyword(3) Behavior analysis
Keyword(4) Parameter
1st Author's Name Nobuki Suetsugu
1st Author's Affiliation Institute of Information Security(IISEC)
2nd Author's Name Masaki Hashimoto
2nd Author's Affiliation Institute of Information Security(IISEC)
Date 2016-11-25
Paper # ICSS2016-40
Volume (vol) vol.116
Number (no) ICSS-328
Page pp.pp.9-14(ICSS),
#Pages 6
Date of Issue 2016-11-18 (ICSS)