COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS
MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 59 of 76
REFERENCES
Alazab, M., Layton, R., Venkataraman, S., and Watters, P., “Malware detection based on structural and behavioural features of API calls,” International Cyber Resilience Conference, 2010.
Alazab, M., Venkatraman, S., Watters, P., and Alazab, M., “Zero-day malware detec- tion based on supervised learning algorithms of api call signatures,” in “Proceedings of the Ninth Australasian Data Mining Conference-Volume 121,” pp. 171–182, Australian Computer Society, Inc., 2011.
AV-test, “Malware Growth in Last 10 Years,” , 2015, URLhttp://www.av-test.
org/en/statistics/malware/, accessed: 2015-06-03.
Aycock, J., Computer viruses and malware, volume 22, Springer Science & Business Media, 2006.
Bai, H., Hu, C.-z., Jing, X.-c., Li, N., and Wang, X.-y., “Approach for malware identi- fication using dynamic behaviour and outcome triggering,” Information Security, IET, volume 8(2) pp. 140–151, 2014.
Chloe Albanesius, L. S., “Report: Stuxnet Worm Attacks Iran, Who is Behind It?”
, 2010, URL http://www.pcmag.com/article2/0,2817,2369745,00.
asp, accessed: 2015-06-01.
Christodorescu, M. and Jha, S., “Static analysis of executables to detect malicious pat- terns,” Technical report, DTIC Document, 2006.
Cuckoo Developers, “Cuckoo Sandbox - open source automated malware analysis,”
Blackhat US Workshop, 2013.
Cuckoo Foundation, “Cuckoo Sandbox,” , 2015, URLhttp://cuckoosandbox.
org/, accessed: 2015-05-19.
Domingos, P., “A few useful things to know about machine learning,”Communications of the ACM, volume 55(10) pp. 78–87, 2012.
Joshua Tommy Juwono
COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS
MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 60 of 76
Dornhackl, H., Kadletz, K., Luh, R., and Tavolato, P., “Malicious behavior patterns,”
in “2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE),” pp. 384–389, IEEE, 2014.
Düssel, P., Holz, T., Laskov, P., Rieck, K., and Willems, C., “Learning and Classifica- tion of Malware Behavior,” , 2009.
Egele, M., Scholte, T., Kirda, E., and Kruegel, C., “A survey on automated dy- namic malware-analysis techniques and tools,”ACM Computing Surveys (CSUR), vol- ume 44(2) p. 6, 2012.
Ernst, M. D., “Static and dynamic analysis: Synergy and duality,” in “WODA 2003:
ICSE Workshop on Dynamic Analysis,” pp. 24–27, Citeseer, 2003.
Fawcett, T., “An introduction to ROC analysis,” Pattern recognition letters, vol- ume 27(8) pp. 861–874, 2006.
Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P., “From data mining to knowledge discovery in databases,”AI magazine, volume 17(3) p. 37, 1996.
Firdausi, I., Analysis Of Machine Learning Techniques Used In Behavior-Based Mal- ware Detection, Bachelor thesis, Swiss German University, 2010.
Firdausi, I., Lim, C., Erwin, A., and Nugroho, A. S., “Analysis of machine learning techniques used in behavior-based malware detection,” in “Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Con- ference on,” pp. 201–203, IEEE, 2010.
Iseclab, “Anubis - Learn about the Anubis Malware Analysis Tool,” , 2015, URL https://anubis.iseclab.org/, accessed: 2015-06-19.
Kaspersky Lab, “THE DUQU 2.0,” , 2015, URL https://securelist.com/
files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_
cyberespionage_actor_returns.pdf, accessed: 2015-06-19.
Kohavi, R. et al., “A study of cross-validation and bootstrap for accuracy estimation and model selection,” in “Ijcai,” volume 14, pp. 1137–1145, 1995.
Kruegel, C., “Labs Report at RSA: Evasive Malware’s Gone Mainstream,” , 2015, URL http://labs.lastline.com/evasive-malware-gone-mainstream, accessed: 2015-05-27.
Joshua Tommy Juwono
COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS
MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 61 of 76
Kujawa, A., “Ransomware,” , 2012, URLhttps://blog.malwarebytes.org/
intelligence/2012/12/ransomware/, accessed: 2015-06-01.
Kumar, A. V., Vishnani, K., and Kumar, K. V., “Split personality malware detection and defeating in popular virtual machines,” in “Proceedings of the Fifth International Conference on Security of Information and Networks,” pp. 20–26, ACM, 2012.
Kushner, D., “The Real Story of Stuxnet,” , 2013, URLhttp://spectrum.ieee.
org/telecom/security/the-real-story-of-stuxnet, accessed: 2015- 05-26.
LeDoux, C. and Lakhotia, A., “Malware and Machine Learning,” in “Intelligent Meth- ods for Cyber Warfare,” pp. 1–42, Springer, 2015.
Lenovo, “SUPERFISH VULNERABILITY,” Technical report, Lenovo, 2015, URL http://support.lenovo.com/us/en/product_security/
superfish, accessed: 2015-06-03.
Mcafee Labs, “McAfee Labs Threats Report,” Technical report, Mcafee Labs, 2014, URLwww.mcafee.com/November2014ThreatsReport.
Microsoft, “Ransomware,” , 2014, URL https://www.microsoft.com/
security/portal/mmpc/shared/ransomware.aspx, accessed: 2015-06- 01.
Moser, A., Kruegel, C., and Kirda, E., “Limits of static analysis for malware detection,”
in “Computer security applications conference, 2007. ACSAC 2007. Twenty-third an- nual,” pp. 421–430, IEEE, 2007.
Powers, D. M., “Evaluation: from precision, recall and F-measure to ROC, informed- ness, markedness and correlation,” , 2011.
Qiao, Y., Yang, Y., He, J., Tang, C., and Liu, Z., “CBM: Free, Automatic Malware Anal- ysis Framework Using API Call Sequences,” in “Knowledge Engineering and Manage- ment,” pp. 225–236, Springer, 2014.
Rieck, K., Trinius, P., Willems, C., and Holz, T., “Automatic analysis of malware behav- ior using machine learning,”Journal of Computer Security, volume 19(4) pp. 639–668, 2011.
Joshua Tommy Juwono
COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS
MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 62 of 76
Svetnik, V., Liaw, A., Tong, C., Culberson, J. C., Sheridan, R. P., and Feuston, B. P., “Random forest: a classification and regression tool for compound classifica- tion and QSAR modeling,” Journal of chemical information and computer sciences, volume 43(6) pp. 1947–1958, 2003.
Tan, P.-N., Steinbach, M., Kumar, V. et al., Introduction to data mining, volume 1, Pearson Education Limited, 2014.
Tian, R., An integrated malware detection and classification system, Ph.D. thesis, Deakin University, 2011.
Vishnani, K., Pais, A. R., and Mohandas, R., “Detecting & Defeating Split Personality Malware,” in “The Fifth International Conference on Emerging Security Information, Systems and Technologies,” , 2011.
Zabidi, M. N. A., Maarof, M. A., and Zainal, A., “Malware analysis with multiple features,” in “Computer Modelling and Simulation (UKSim), 2012 UKSim 14th Inter- national Conference on,” pp. 231–235, IEEE, 2012.
Joshua Tommy Juwono