Visualization of shared system call sequence relationships in large malware corpora

@inproceedings{Saxe2012VisualizationOS,
  title={Visualization of shared system call sequence relationships in large malware corpora},
  author={Joshua Saxe and David Mentis and Christopher Greamo},
  booktitle={VizSEC},
  year={2012}
}
We present a novel system for automatically discovering and interactively visualizing shared system call sequence relationships within large malware datasets. Our system's pipeline begins with the application of a novel heuristic algorithm for extracting variable length, semantically meaningful system call sequences from malware system call behavior logs. Then, based on the occurrence of these semantic sequences, we construct a Boolean vector representation of the malware sample corpus. Finally… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 22 CITATIONS

A Novel Malware Detection System Based on Machine Learning and Binary Visualization

  • 2019 IEEE International Conference on Communications Workshops (ICC Workshops)
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Visualizing Automatically Detected Periodic Network Activity

  • 2018 IEEE Symposium on Visualization for Cyber Security (VizSec)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Retrospective on a decade of research in visualization for cybersecurity

  • 2017 IEEE International Symposium on Technologies for Homeland Security (HST)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

A Matrix-Based Visualization System for Network Traffic Forensics

  • IEEE Systems Journal
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND