DocumentCode :
630139
Title :
Visualization techniques for efficient malware detection
Author :
Donahue, Jeff ; Paturi, Anand ; Mukkamala, Srinivas
Author_Institution :
Comput. Anal. & Network Enterprise Solutions, LLC, Albuqeurque, NM, USA
fYear :
2013
fDate :
4-7 June 2013
Firstpage :
289
Lastpage :
291
Abstract :
Traditional tools for reverse engineering of binary and PE files are limited to heavy text base output, thus requiring skilled analysts to use them. In this paper, we present techniques that will visualize PE files, which will help analysts with basic skills to quickly understand their underlying structure. We also present Markov Byte Plot-based techniques to identify packed malware and discuss how our techniques can aid cybersecurity community for better enumeration of malicious software.
Keywords :
Markov processes; data visualisation; invasive software; reverse engineering; Markov byte plot-based techniques; PE files; binary files; cybersecurity community; malicious software; malware detection; reverse engineering; text base output; visualization techniques; Encoding; Malware; Markov processes; Navigation; Reverse engineering; Visualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4673-6214-6
Type :
conf
DOI :
10.1109/ISI.2013.6578845
Filename :
6578845
Link To Document :
بازگشت