|
[1]Nick Hnatiw, Tom Robinson, Casey Sheehan, Nick Suan,” Pimp My PE: Parsing Malicious and Malformed Executables” [2]Schultz, M., Eskin, E., Zadok, E. ,”MEF Malicious email filter,a UNIX mail filter that detects malicious windows executables.” in Proc. of the USENIX annual technical conference—FREENIX track (pp. 245–252). [3]Schultz, M., Eskin, E., Zadok, E., and Stolfo, S.”Data mining methods for detection of new malicious executables.” in Proc. of the IEEE symposium on security and privacy (pp. 178–184). [4]Qinghua Z., Douglas S” Metaaware: Identifying metamorphic malware,” in ACSAC, 2007, pp. 411–420. [5]L. Nataraj, S. Karthikeyan, G Jacob, and BB. Manjunath,“Malware Images: Visualization and Automatic Classification” in Proceedings of the 8th International Symposium on Visualization for Cyber Security. ACM,2011, P.4 [6]Tzu-Yen W.,Chin-Hsiung W.,Chu-Cheng H.” A Virus Prevention Model Based on Static Analysis and Data Mining Methods” in CIT Workshops 2008 [7]Mohammad M. Masud, Latifur Khan, and B.Thuraisingham.” A scalable multi-level feature extraction technique to detect malicious executables.” In Information Systems Frontiers 10(1):33-45 (2008) [8]Mohammad M. Masud, Latifur Khan, and B.Thuraisingham.” A hybrid model to detect malicious executables.” in Proc. of the IEEE international conference on communication (ICC’07) (pp. 1443–1448) [9]Mohammad M. Masud, Latifur Khan, and B.Thuraisingham.” Feature based techniques for auto-detection of novel email worms.” in Proc. of the eleventh Pacific-Asia conference on knowledge discovery and data mining (PAKDD’07) (pp. 205–216). [10]Lakhotia, A., Kumar, E. U., and Venable, M. “A method for detecting obfuscated calls in malicious binaries.” in IEEE Transactions on Software Engineering, 31(11), 955–968. [11]Christopher K., William R., Fredrik V. and Giovanni V.” Static Disassembly of Obfuscated Binaries” in In Proceedings of USENIX Security (USENIX04) [12]Xin H., Kang G., Sandeep B., and Kent G.” MutantX-S: Scalable Malware Clustering Based on Static Features.” in USENIX Annual Technical Conference, page 187-198. USENIX Association, (2013) [13]Xin H., Kang G.” DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles.” in ACSAC, page 79-88. ACM, (2013) [14]“Microsoft Portable Executable and Common Object File Format Specification” http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx [15]Ting W., Xin H., Shicong M., and Reiner S.” Reconciling malware labeling discrepancy via consensus learning.” in ICDE Workshops, page 84-89. IEEE, (2014) [16]Jeremy Z. Kolter, and Marcus A. “Learning to Detect and Classify Malicious Executables in the Wild.” in Journal of Machine Learning Research (2006) [17]Konrad R., Philipp T., Carsten W., and Thorsten H.” Automatic analysis of malware behavior using machine learning.” in Journal of Computer Security 19(4):639-668 (2011) [18]Nello C.,John S.”An Introduction to Support Vector Machines and other kernel-based learning methods. “Cambridge University Press, 2000. [19]TG Dietterich,” Ensemble learning” in The handbook of brain theory and neural networks, 2002 [20]Xgboost , https://github.com/dmlc/xgboost [21]Information gain, ” https://www.wikiwand.com/en/Information_gain_in_decision_trees” [22]O Chapelle, B Schölkopf, A Zien ,“Semi-supervised learning”,2006 [23]IDA Pro,https://www.hex-rays.com/products/ida/
|