Presentation | 2016-11-25 Study of behavior each malware function from the API calls Nobuki Suetsugu, Masaki Hashimoto, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much technique is suggested about the detection by similarity with the known malware behavior. In the detection using classification method, though it is an important item for the selection of parameters for characterizing the behavior and the classification technique which take in the parameter that improve the detection rate, most of the studies on the individual parameters itself are not done. This study shows feature of every malware family with their behavior and views the parameter selections. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Malware / classification / Behavior analysis / Parameter |
Paper # | ICSS2016-40 |
Date of Issue | 2016-11-18 (ICSS) |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2016/11/25(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Institute of Information Security |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Information and Communication System Security, etc. |
Chair | Yutaka Miyake(KDDI R&D Labs.) |
Vice Chair | Yoshiaki Shiraishi(Kobe Univ.) / Takeshi Ueda(Mitsubishi Electric) |
Secretary | Yoshiaki Shiraishi(NII) / Takeshi Ueda(Yokohama National Univ.) |
Assistant | Kazunori Kamiya(NTT) / Takahiro Kasama(NICT) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Study of behavior each malware function from the API calls |
Sub Title (in English) | |
Keyword(1) | Malware |
Keyword(2) | classification |
Keyword(3) | Behavior analysis |
Keyword(4) | Parameter |
1st Author's Name | Nobuki Suetsugu |
1st Author's Affiliation | Institute of Information Security(IISEC) |
2nd Author's Name | Masaki Hashimoto |
2nd Author's Affiliation | Institute of Information Security(IISEC) |
Date | 2016-11-25 |
Paper # | ICSS2016-40 |
Volume (vol) | vol.116 |
Number (no) | ICSS-328 |
Page | pp.pp.9-14(ICSS), |
#Pages | 6 |
Date of Issue | 2016-11-18 (ICSS) |