Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach (1902.03955v1)

Published 11 Feb 2019 in cs.CR

Abstract: The growth in the number of Android and Internet of Things (IoT) devices has witnessed a parallel increase in the number of malicious software (malware), calling for new analysis approaches. We represent binaries using their graph properties of the Control Flow Graph (CFG) structure and conduct an in-depth analysis of malicious graphs extracted from the Android and IoT malware to understand their differences. Using 2,874 and 2,891 malware binaries corresponding to IoT and Android samples, we analyze both general characteristics and graph algorithmic properties. Using the CFG as an abstract structure, we then emphasize various interesting findings, such as the prevalence of unreachable code in Android malware, noted by the multiple components in their CFGs, and larger number of nodes in the Android malware, compared to the IoT malware, highlighting a higher order of complexity. We implement a Machine Learning based classifiers to detect IoT malware from benign ones, and achieved an accuracy of 97.9% using Random Forests (RF).

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Hisham Alasmary (7 papers)
  2. Aminollah Khormali (8 papers)
  3. Afsah Anwar (9 papers)
  4. Jeman Park (8 papers)
  5. Jinchun Choi (4 papers)
  6. DaeHun Nyang (30 papers)
  7. Aziz Mohaisen (26 papers)
Citations (5)

Summary

We haven't generated a summary for this paper yet.