Title : 
Babble: Identifying malware by its dialects
         
        
            Author : 
Mohaisen, Aziz ; Alrawi, Omar ; West, Andrew G. ; Mankin, Allison
         
        
            Author_Institution : 
Verisign Labs., Reston, VA, USA
         
        
        
        
        
        
            Abstract : 
Using runtime execution artifacts to identify whether code is malware, and to which malware family it belongs, is an established technique in the security domain. Traditionally, literature has relied on explicit features derived from network, file system, or registry interaction [1]. While effective, the collection and analysis of these fine-granularity data points makes the technique quite computationally expensive. Moreover, the signatures/heuristics this analysis produces are often easily circumvented by subsequent malware authors.
         
        
            Keywords : 
invasive software; Babble system; fine-granularity data points; malware dialects; malware identification; runtime execution artifacts; security domain; Accuracy; Conferences; Decision trees; Malware; Measurement; Support vector machines;
         
        
        
        
            Conference_Titel : 
Communications and Network Security (CNS), 2013 IEEE Conference on
         
        
            Conference_Location : 
National Harbor, MD
         
        
        
            DOI : 
10.1109/CNS.2013.6682751