1. Using feature generation from API calls for malware detection
- Author
-
Zahra Salehi, Ashkan Sami, and Mahboobe Ghiasi
- Subjects
Scareware ,Software_OPERATINGSYSTEMS ,General Computer Science ,Computer science ,business.industry ,Rootkit ,Permission ,Adware ,Computer security ,computer.software_genre ,Cryptovirology ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Software ,False positive paradox ,Malware ,business ,Law ,computer - Abstract
The term malware – a combination of the words ‘malicious’ and ‘software’ – refers to a group of software designed to penetrate or damage a computer system without the owner's permission. This set includes viruses, trojans, backdoors, worms, adware, rootkits, spyware and so on. Methods for detecting malicious software, based on signatures, are easily evaded, so anti-virus vendors rely on dynamic analysis to detect zero-day binaries. Unfortunately, this is too slow and inefficient to be used in commercial anti-virus. Zahra Salehi, Ashkan Sami and Mahboobe Ghiasi of Shiraz University, Iran, propose a new malware detection technique based on identifying malicious behaviour through API calls and/or arguments. The high accuracy and low false positives of the method demonstrate that it is appropriate for real-world commercial applications, they argue.
- Published
- 2014
- Full Text
- View/download PDF