Presentation 2010-03-26
Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads
Junji NAKAZATO, Jumpei SHIMAMURA, Masashi ETO, Daisuke INOUE, Koji NAKAO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always play a leading part of the threats. Recently, a lot of kinds of malwares are developed easily to combine some modules that are infection, attack, and so on. It is important to make function of the malware clear. In this paper, we extract function from each thread to present relation between other malware which has same function set. Moreover it is useful for detecting unknown/subspecific malwares.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Incident analysis / Malware / Dynamic Analysis
Paper # ICSS2009-68
Date of Issue

Conference Information
Committee ICSS
Conference Date 2010/3/19(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads
Sub Title (in English)
Keyword(1) Incident analysis
Keyword(2) Malware
Keyword(3) Dynamic Analysis
1st Author's Name Junji NAKAZATO
1st Author's Affiliation National Institute of Information and Communications Technology()
2nd Author's Name Jumpei SHIMAMURA
2nd Author's Affiliation ForSchooner Inc.
3rd Author's Name Masashi ETO
3rd Author's Affiliation National Institute of Information and Communications Technology
4th Author's Name Daisuke INOUE
4th Author's Affiliation National Institute of Information and Communications Technology
5th Author's Name Koji NAKAO
5th Author's Affiliation National Institute of Information and Communications Technology
Date 2010-03-26
Paper # ICSS2009-68
Volume (vol) vol.109
Number (no) 476
Page pp.pp.-
#Pages 5
Date of Issue