A survey on graph-based methods for malware detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The widespread presence of malware is causing economic loss to organizations and individuals. For this reason, detecting malware has gained great interest as part of a computer security topic. Most current malware detection software uses signature-based methods to identify threats. However, this syntactic approach fails to identify variants of known malware or previously undiscovered malware. Since graphs represent a strong tool for modeling the sophisticated behaviors of malware and it is harder for an attacker to radically change the behavior of malware than to morph its syntactic structure, many graph-based methods are proposed to overcome the disadvantages of the traditional approach. In this paper, we present a survey of graph-based approaches for malware detection.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Advanced Systems and Emergent Technologies, IC_ASET 2020
EditorsAbdessattar Ben Amor, Salwa Elloumi, Samir Nejim, Nabila Dhahbi, Hassene Gritli, Naoufel Machta
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages130-134
Number of pages5
ISBN (Electronic)9781728163567
DOIs
StatePublished - 15 Dec 2020
Event4th International Conference on Advanced Systems and Emergent Technologies, IC_ASET 2020 - Hammamet, Tunisia
Duration: 15 Dec 202018 Dec 2020

Publication series

NameProceedings of the International Conference on Advanced Systems and Emergent Technologies, IC_ASET 2020

Conference

Conference4th International Conference on Advanced Systems and Emergent Technologies, IC_ASET 2020
Country/TerritoryTunisia
CityHammamet
Period15/12/2018/12/20

Keywords

  • Dynamic analysis
  • Graphs
  • Malware detection
  • Static analysis

Fingerprint

Dive into the research topics of 'A survey on graph-based methods for malware detection'. Together they form a unique fingerprint.

Cite this