On the feasibility of binary authorship characterization

Digital Investigation - Tập 28 - Trang S3-S11 - 2019
Saed Alrabaee1, Mourad Debbabi2, Lingyu Wang2
1Information Systems & Security, United Arab Emirates University, United Arab Emirates
2Computer Security Laboratory, Concordia Institute for Information Systems Engineering, Concordia University, Canada

Tài liệu tham khảo

Alrabaee, 2014, Oba2: an onion approach to binary code authorship attribution, Digit. Invest., 11, S94, 10.1016/j.diin.2014.03.012 Alrabaee, 2018, On leveraging coding habits for effective binary authorship attribution, 26 Bayer, 2009, Scalable, behavior-based malware clustering, NDSS, 9, 8 2015 A. Caliskan-Islam, F. Yamaguchi, E. Dauber, R. Harang, K. Rieck, R. Greenstadt, A. Narayanan, When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries, arXiv preprint arXiv:1512.08546. Caliskan-Islam, 2015 2015 Farnstrom, 2000, Scalability for clustering algorithms revisited, ACM SIGKDD Explorations Newsletter, 2, 51, 10.1145/360402.360419 2012 Frantzeskou, 2004, 470 Glorot, 2011, Deep sparse rectifier neural networks, 315 2011 G. Huang, Z. Liu, K. Q. Weinberger, L. van der Maaten, Densely Connected Convolutional Networks, arXiv preprint arXiv:1608.06993. Huang, 2017, Binsequence: fast, accurate and scalable binary code reuse detection, 155 Karbab, 2016, Dysign: dynamic fingerprinting for the automatic detection of android malware, 1 Kirat, 2013, Sigmal: a static signal processing based malware triage, 89 Kolosnjaji, 2016, Deep learning for classification of malware system call sequences, 137 lab, 2014 Maas, 2013 McCabe, 1976, A complexity measure, IEEE Trans. Softw. Eng., SE-2, 308, 10.1109/TSE.1976.233837 Meng, 2016, Fine-grained binary code authorship identification, 1097 Moran, 2013, vol. 11 Nagano, 2017, Static analysis with paragraph vector for malware detection, 80 Nataraj, 2011, Malware images: visualization and automatic classification, 4 Nataraj, 2013, Sarvam: search and retrieval of malware Rahimian, 2015, Bincomp: a stratified approach to compiler provenance attribution, Digit. Invest., 14, S146, 10.1016/j.diin.2015.05.015 Rosenblum, 2011, Who wrote this code? identifying the authors of program binaries, 172 Saxe, 2015, Deep neural network based malware detection using two dimensional binary program features, 11 Schkufza, 2015 Sharma, 2016 Shin, 2015 Tate, 2009, Equality saturation: a new approach to optimization, vol. 44, 264 Taylor, 2008, Author entropy: a metric for characterization of software authorship patterns, 6 2011 reportTechniqal report, Resource 207: Kaspersky Lab Research proves that Stuxnet and Flame developers are connected, http://www.kaspersky.com/about/news/virus/2012/. 2016 2008 Tristan, 2011, Evaluating value-graph translation validation for llvm, ACM Sigplan Not., 46, 295, 10.1145/1993316.1993533 Wagner, 2017, A knowledge-assisted visual malware analysis system: design, validation, and reflection of kamas, Comput. Secur., 67, 1, 10.1016/j.cose.2017.02.003 Wei, 2016, Hcp: a flexible cnn framework for multi-label image classification, IEEE Trans. Pattern Anal. Mach. Intell., 38, 1901, 10.1109/TPAMI.2015.2491929 Woldring, 2016, Scaffoldseq: software for characterization of directed evolution populations, Proteins: Structure, Function, and Bioinformatics, 84, 869, 10.1002/prot.25040