Singular value decomposition and metamorphic detection
Tóm tắt
Từ khóa
Tài liệu tham khảo
Arfken, G.: Diagonalization of matrices. In: Mathematical Methods for Physicists, 3rd edn, pp. 217–229. Academic Press, New York (1985)
Wikipedia: Singular value decomposition. http://en.wikipedia.org/wiki/Singular_value_decomposition (2014). Accessed 19 July 2014
Austin, D.: We recommend a singular value decomposition. http://www.ams.org/samplings/feature-column/fcarc-svd . Accessed 19 Jul 2014
Austin, T., Filiol, E., Josse, S., Stamp, M.: Exploring hidden Markov models for virus analysis: a semantic approach. In: 46th Hawaii International Conference on System Sciences (HICSS 46), pp. 5039–5048 (2012)
Aycock, J.: Computer Viruses and Malware. Springer, Berlin (2006)
Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. 9(4), 179–192 (2013)
Borello, J., Me, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. 4(3), 211–220 (2008)
Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recogn. 30, 1145–1159 (1997)
Chess, D.M., White, S.R.: An undetectable computer virus. In: Virus Bulletin Conference September (2000)
Deng, W., et al.: A malware detection framework based on Kolmogorov complexity. J. Computat. Inf. Syst. 7(8):2687–2694 (2011). http://www.jofcis.com/publishedpapers/2011_7_8_2687_2694.pdf
Deshpande, S., Park, Y., Stamp, M.: Eigenvalue analysis for metamorphic detection. J. Comput. Virol. Hacking. Tech. 10(1), 53–65 (2014)
Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. Int. J. Comput. Sci. 2, 70–75 (2007)
Hsu, C., Chen, C.: SVD-based projection for face recognition. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4374514 . Accessed 19 July 2014
JAMA. Java matrix package http://math.nist.gov/javanumerics/jama/ . Accessed 19 July 2014
Jidigam, R.K.: Metamorphic detection using singular value decomposition. Department of Computer Science, San Jose State University, Master’s report (2013)
Lee, J.: Compression-based analysis of metamorphic malware. Department of Computer Science, San Jose State University, Master’s report (2013)
Mean vector and covariance matrix, NIST. http://www.itl.nist.gov/div898/handbook/pmc/section5/pmc541.htm . Accessed 19 July 2014
The Mental Driller, Metamorphism in practice or “How I made MetaPHOR and what I’ve learnt” (2002). http://vxheavens.com/lib/vmd01.html
Noble, W.S.: What is a support vector machine? Nat. Biotechnol. 24(12), 1565–1567 (2006). http://marriottschool.net/teacher/IS555/Other/SVM_Readings.pdf
Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2), 257–286 (1989)
Runwal, N., Low, R.M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1–2), 37–52 (2012)
Saleh, M., Mohamed, A., Nabi, A.: Eigenviruses for metamorphic virus recognition. IET Inf. Secur. 5(4), 191–198 (2011)
Shlens, J.: A tutorial on principal component analysis. http://www.cs.cmu.edu/~elaw/papers/pca.pdf . Accessed 19 July 2014
Shanmugam, G., Low, R.M., Stamp, M.: Simple substitution distance and metamorphic detection. J. Comput. Virol. Hack. Tech. 9(3), 159–170 (2013)
Singular value decomposition, Wolfram MathWorld. http://mathworld.wolfram.com/SingularValueDecomposition.html . Accessed 19 July 2014
Sridhara, S., Stamp, M.: Metamorphic worm that carries its own morphing engine. J. Comput. Virol. 9(2), 49–58 (2013)
Stamp, M.: A revealing introduction to hidden Markov models (2012). http://www.cs.sjsu.edu/stamp/RUA/HMM.pdf
Toderici, A.H., Stamp, M.: Chi-squared distance and metamorphic virus detection. J. Comput. Virol. Hack. Tech. 9(1), 1–14 (2013)
Virus Profile: W32/NGVCK, McAfee Inc. http://home.mcafee.com/virusinfo/virusprofile.aspx?key=1090050 . Accessed 19 July 2014
You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297–300 (2010)
Zbitskiy, P.: Code mutation techniques by means of formal grammars and automatons. J. Comput. Virol. 5(3), 199–207 (2009)
Zhou, Y., Inge, M.: Malware detection using adaptive data compression, AISec ’08. In: Proceedings of the 1st ACM workshop on Workshop on AISec, pp. 53–60 (2008)