Int J Performability Eng ›› 2019, Vol. 15 ›› Issue (3): 772-781.doi: 10.23940/ijpe.19.03.p6.772781
Previous Articles Next Articles
Lele Wanga, Binqiang Wanga, Jiangang Liub, Qiguang Miaoc, and Jianhui Zhanga, *
Submitted on
;
Revised on
;
Contact:
ndsczjh@163.com
About author:
Lele Wang is a Ph.D. student at the National Digital Switching System Engineering and Technology Research Center whose main research direction is information security.Binqiang Wang is a professor and doctoral tutor at the National Digital Switching System Engineering and Technology Research Center. His research interests include network security and broadband information networks.Jiangang Liu is a researcher at the Nanjing Information Technology Institute whose main research direction is information security.Qiguang Miao is a professor and Ph.D. supervisor in the School of Computer Science at Xidian University as well as a director of the China Computer Federation (CCF), chairman of CCF YOCSEF, member of the CCF Artificial Intelligence and Pattern Recognition Committee, standing committee member of the CCF Computer Vision Committee, and IEEE senior member. His main research directions include intelligent image processing, machine learning, and high performance computing.Jianhui Zhang is an associate research fellow at the National Digital Switching System Engineering and Technology Research Center whose main research direction is broadband information networks.
Lele Wang, Binqiang Wang, Jiangang Liu, Qiguang Miao, and Jianhui Zhang. Cuckoo-based Malware Dynamic Analysis [J]. Int J Performability Eng, 2019, 15(3): 772-781.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
1. J. R. Xue, J. W. Fang, and P. Zhang, “A Survey of Scene Understanding by Event Reasoning in Autonomous Driving,” 2. G. Hinton, S. Osindero, M. Welling,Y. W. Teh, “Unsupervised Discovery of Nonlinear Structure using Contrastive Backpropagation,” 3. J. R. Bai, J. F. Wang,Z. Q. Zhao, “Malware Detection Approach based on Structural Feature of PE File,” 4. A. Moser, C. Kruegel,E. Kirda, “Limits of Static Analysis for Malware Detection,” in 5. M. Egele, T. Scholte, E. Kirda,C. Kruegel, “A Survey on Automated Dynamic Malware-Analysis Techniques and Tools,” 6. U. Bayer, A. Moser, C. Kruegel,E. Kirda, “Dynamic Analysis of Malicious Code,” 7. C. Willems, T. Holz,F. Freiling, “Toward Automated Dynamic Malware Analysis using CWsandbox,” 8. F. Ahmed, H. Hameed, M. Z. Shafiq,M. Farooq, “Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection,” in 9. J. Ouellette, A. Pfeffer,A. Lakhotia, “Countering Malware Evolution using Cloud-Based Learning,” in 10. W. Rui, D. G. Feng, Y. Yi,S. U.Pu-Rui, “Semantics-based Malware Behavior Signature Extraction and Detection Method,” 11. Y. Li, R. Ma,R. Jiao, “A Hybrid Malicious Code Detection Method based on Deep Learning,” 12. L. I.Chun-Lin, Y. J. Huang, H. Wang, and C. X. Niu, “Detection of Network Intrusion based on Deep Learning,” in 13. J. Watson, “VirtualBox: Bits and Bytes Masquerading as Machines,” 14. F. Bellard, “QEMU, A Fast and Portable Dynamic Translator,” in 15. C. Guarnieri, A. Tanasi, J. Bremer,M. Schloesser, “The Cuckoo Sandbox,” (http://cuckoosandbox.org, 2012 16. J. Choi, H. Kim, C. Choi,P. Kim, “Efficient Malicious Code Detection using N-gram Analysis and SVM,” in 17. E. Raff, R. Zak, R. Cox, J. Sylvester, P. Yacci, R. Ward, et al., “An Investigation of Byte N-gram Features for Malware Classification,” 18. R. Moskovitch, C. Feher, N. Tzachar, E. Berger, M. Gitelman, S. Dolev, et al., “Unknown Malcode Detection using OPCODE Representation,” in 19. A. A. E.Elhadi, M. A. Maarof, and A. H. Osman, “Malware Detection based on Hybrid Signature Behaviour Application Programming interface Call Graph,” 20. P. Faruki, V. Laxmi, M. S. Gaur,P. Vinod, “Mining Control Flow Graph as API Call-Grams to Detect Portable Executable Malware,” in 21. B. Anderson, D. Quist, J. Neil, C. Storlie,T. Lane, “Graph-based Malware Detection using Dynamic Analysis,” 22. S. Alam, I. Traore,I. Sogukpinar, “Annotated Control Flow Graph for Metamorphic Malware Detection.,” 23. Y. Cao, Q. Miao, J. Liu,L. Gao, “Abstracting Minimal Security-Relevant Behaviors for Malware Analysis,” 24. G. E. Hinton, “Learning Distributed Representations of Concepts,” in 25. A. Mnih and G. Hinton, “Three New Graphical Models for Statistical Language Modeling,” in 26. A. Mnih and G. E. Hinton, “A Scalable Hierarchical Distributed Language Model,” 27. R. Socher, C. D. Manning,A. Y. Ng, “Learning Continuous Phrase Representations and Syntactic Parsing with Recursive Neural Networks,” in 28. R. Socher, A. Perelygin, J. Wu, J. Chuang, C. D. Manning, A. Ng, et al., “Recursive Deep Models for Semantic Compositionality over a Sentiment Treebank,” in |
[1] | Lingling Wang, Wenyin Gong, and Xiang Li. Deep Convolutional Neural Network and Its Application in Image Recognition of Road Safety Projects [J]. Int J Performability Eng, 2019, 15(8): 2182-2189. |
[2] | Shuang Liu, Xing Cui, Jiayi Li, Hui Yang, and Niko Lukač. Pedestrian Detection based on Faster R-CNN [J]. Int J Performability Eng, 2019, 15(7): 1792-1801. |
[3] | Wenli Liu, Cuiping Shi, Hongbo Yu, and Hanxiong Fang. Task Scheduling of an Improved Cuckoo Search Algorithm in Cloud Computing [J]. Int J Performability Eng, 2019, 15(7): 1965-1975. |
[4] | Wenzhi Liu, Tianxiang Wang, and Jian Tao. Analysis of Meshing Performance and Fatigue Reliability of Main Reducer Transmission Device for Rail Conveyor [J]. Int J Performability Eng, 2019, 15(7): 1886-1894. |
[5] | Ying Wang, Aili Wang, Ronghui Wang, Haiyang Liu, and Yuji Iwahori. Target Tracking Algorithm based on Context-Aware Deep Feature Compression [J]. Int J Performability Eng, 2019, 15(7): 1802-1812. |
[6] | Sizhe Huang, Huosheng Xu, and Xuezhi Xia. Imbalanced Remote Sensing Ship Image Classification [J]. Int J Performability Eng, 2019, 15(6): 1709-1715. |
[7] | Wenfang Zhao, Yong Zhou, and Wei Tang. Novel Convolution and LSTM Model for Forecasting PM2.5 Concentration [J]. Int J Performability Eng, 2019, 15(6): 1528-1537. |
[8] | Yoshinobu Tamura and Shigeru Yamada. Fault Big Data Analysis Tool based on Deep Learning [J]. Int J Performability Eng, 2019, 15(5): 1289-1296. |
[9] | Risu Na, Jie Liu, and Haitang Cen. Random Dynamic Analysis of Ring Die Pellet Mill [J]. Int J Performability Eng, 2019, 15(2): 362-373. |
[10] | Lingling Wang, Wenyin Gong, and Xiang Li. Remote Sensing Identification of Black Cotton Soil based on Deep Belief Network [J]. Int J Performability Eng, 2018, 14(11): 2820-2830. |
|