Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Control flow graph from API calla
#1

Control flow graph from API calla

ABSTRACT Present day malware shows stealthy and dynamic capability and avails administrative rights to control the victim computers. Malware writers depend on evasion techniques like code obfuscation, packing, compression, encryption or polymorphism to avoid detection by Anti-Virus (AV) scanners as AV primarily use syntactic signature to detect a known malware. Our approach is based on semantic aspect of PE exectable that analyses API Call-grams to detect unknown malicious code. As in--exact source code is analysed, the machine is not infected by the executable. Moreover, static analysis covers all the paths of code which is not possible with dynamic behavioural methods as latter does not gurantee the execution of sample being analysed. Modern malicious samples also detect controlled virtual and emulated environments and stop the functioning. Semantic invariant approach is important as signature of known samples are changed by code obfuscation tools. Static analysis is performed by generating an API Call graph from control flow of an executable, then mining the Call graph as API Call-gram to detect malicious files.
Reply
#2
Automatic tool to convert API calls from the execution trace to corresponding Control Flow graph and also to get subgraphs of CFG
Reply
#3

I like this
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: graph of a switch using a transistor and to draw the graph between the input and output voltage and mark the cut off saturati, freedownload fuzzy graph and hyper graph, cellphones beyond calla nad sms ppt download, graph of seperation of losses of dc machines graph, open graph search engine api technical 2013, how to draw graph for regulation of three phase alternator by emf and mmf methods graph, invitation to graph theory by s arumugam pdf download graph,

Forum Jump:


Users browsing this thread: 1 Guest(s)