Malware Pattern Scanning Schemes Secure Against Black-box Analysis

@article{Filiol2006MalwarePS,
  title={Malware Pattern Scanning Schemes Secure Against Black-box Analysis},
  author={Eric Filiol},
  journal={Journal in Computer Virology},
  year={2006},
  volume={2},
  pages={35-50}
}
As a general rule, copycats produce most of malware variants from an original malware strain. For this purpose, they widely perform black-box analyses of commercial scanners aiming at extracting malware detection patterns. In this paper, we first study the malware detection pattern extraction problem from a complexity point of view and provide the results of a wide-scale study of commercial scanners’ black-box analysis. These results clearly show that most of the tested commercial products fail… CONTINUE READING
Highly Cited
This paper has 92 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
55 Citations
23 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 55 extracted citations

92 Citations

01020'08'11'14'17
Citations per Year
Semantic Scholar estimates that this publication has 92 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 23 references

Automatic extraction of computer virus signatures

  • J. O. Kephart, W. Arnold
  • Proceedings of the 4th Virus Bulletin…
  • 1994
Highly Influential
4 Excerpts

Advanced Computer Virology, IRIS International series

  • E. Filiol
  • Berlin Heidelberg New York: Springer
  • 2006

Computer viruses: from theory to applications, IRIS international series

  • E. Filiol
  • Berlin Heidelberg New York: Springer, ISBN 2-287…
  • 2005
1 Excerpt

The Art of Computer Virus Research and Defense

  • P. Szor
  • Symantec Press and Addison Wesley, Reading, ISBN…
  • 2005
1 Excerpt

2004 information security breaches survey, UK Department of Trade and Industry, 2004

  • S. Stimms, C. Potter, A. Beard
  • Available at http://www.security-survey.gov.uk. A…
  • 2004
1 Excerpt

Similar Papers

Loading similar papers…