Keyword : malware detection

An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio
Kyohei OSUGE Hiroya KATO Shuichiro HARUTA Iwao SASASE 
Publication Date: 2019/06/01
Vol. E102-D  No. 6 ; pp. 1136-1144
Type of Manuscript:  PAPER
Category: Dependable Computing
androidmalware detectionICCfeature selection
 Summary | Full Text:PDF

Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
Hyun-Joo KIM Jong-Hyun KIM Jung-Tai KIM Ik-Kyun KIM Tai-Myung CHUNG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 1071-1080
Type of Manuscript:  Special Section PAPER (Special Section on Cyberworlds)
malware detectionfeature-chainmultiple sequence alignmentsimilarity measureantivirus
 Summary | Full Text:PDF

Catching the Behavioral Differences between Multiple Executions for Malware Detection
Takahiro KASAMA Katsunari YOSHIOKA Daisuke INOUE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 225-232
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: System Security
malware detectiondynamic analysisBehavioral Differences
 Summary | Full Text:PDF

Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
YoungHan CHOI HyoungChun KIM DongHoon LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/05/01
Vol. E95-B  No. 5 ; pp. 1711-1721
Type of Manuscript:  PAPER
Category: Internet
malware detectionheap spraying attack
 Summary | Full Text:PDF

Executable Code Recognition in Network Flows Using Instruction Transition Probabilities
Ikkyun KIM Koohong KANG Yangseo CHOI Daewon KIM Jintae OH Jongsoo JANG Kijun HAN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/07/01
Vol. E91-D  No. 7 ; pp. 2076-2078
Type of Manuscript:  LETTER
Category: Application Information Security
executable codemalware detectionIA-32 Instruction
 Summary | Full Text:PDF