Towards a Representation of Malware Execution Traces for Experts and Machine Learning - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2022

Towards a Representation of Malware Execution Traces for Experts and Machine Learning

Résumé

Dynamic analysis is a common technique to analyze the run-time behavior of software and identify malware (malicious software). Execution traces typically contain the list of system calls with their parameters, the list of accessed files, etc. Several representations have been proposed to organize these data better and help both human experts and automated tools analyze them effectively. This paper reviews these representations and identifies four research problems that the first author plans to investigate during his Ph.D.
Fichier principal
Vignette du fichier
tmpl1x8uhgv_RESSI.pdf (100.63 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03675366 , version 1 (23-05-2022)

Identifiants

  • HAL Id : hal-03675366 , version 1

Citer

Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong. Towards a Representation of Malware Execution Traces for Experts and Machine Learning. RESSI 2022 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2022, Chambon-sur-Lac, France. pp.1-3. ⟨hal-03675366⟩
131 Consultations
143 Téléchargements

Partager

Gmail Facebook X LinkedIn More