- C. Funk and M. Garnaeva, “Kaspersky Security Bulletin 2013,” Kaspersky Lab, 2013.
- C. Fred, “Computer viruses: Theory and experiments,” Computers & Security, vol. 6, no. 1, pp. 22-35, 1987.
- V. Nair, H. Jain, and Y. Golecha, “MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API,” Proceedings of the 3rd international conference on Security of information and networks, ACM, 2010.
- P. O'Kane, S. Sezer, and K. McLaughlin, “Obfuscation: The Hidden Malware,” IEEE Symposium on Security & Privacy, Oakland, 2011.
- P. Szor, “The art of computer virus research and defense,” Pearson Education, 2005.
- M. Egele, T. Scholte, E. Kirda, and C. Kruegle, “A survey on automated dynamic malware-analysis techniques and tools,” CSUR, vol. 44, no. 2, pp. 1-42, 2012.
- C. Mihai, S. Seshia, and J. Somesh, “Semantics-aware malware detection,” IEEE Symposium on Security and Privacy, Oakland, 2005.
- C. Kruegel, W. Robertson, and G. Vigna, “Detecting Kernel-Level Rootkits Through Binary Analysis,” 20th Annual Conference on Computer Security Applications, Tucson, 2004.
- M. Andreas, C. Kruegel, and E. Kirda, “Limits of Static Analysis for Malware Detection,” 23th Annual Conference on Computer Security Applications, Miami Beach, 2007.
- M. Suenaga, “A Museum of API Obfuscation on Win32,” Proceedings of 12th Association of Anti-Virus Asia Researchers International Conference, Kyoto, 2009.
- S. Motevasel, H. Shirazi, and M. Farshchieyan, “Providing an efficient system for malware detection and classification,” 1st National E-Conference of Technology Departments on Electrical, Electronics and Computer Engineering, Khayyam University, Mashhad, 2014.
- M. Lajevardi, S. Parsa, and M. Kangavari, “The design and implementation of a behavioral based malware detection,” Master of Thesis in Computer Engineering School, Iran University of Science and Technology, Tehran, 2013.
- C. Kolbitsch and P. M. Comparetti, “Effective and Efficient Malware Detection at the End Host,” USENIX security symposium, San Diego, 2009.
- J. Somesh, M. Fredrikson, and M. Christodore, “Synthesizing near-optimal malware specifications from suspicious behaviors,” 8th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), Fajardo, 2013.
- M. Bailey, J. Oberheide, J. Andersen, Z. M. Morley, F. Jahanian, and J. Nazario, “Automated Classification and Analysis of Internet Malware,” International Workshop on Recent Advances in Intrusion Detection, Gold Coast, 2007.
- K. Rieck, T. Holz, C. Willems, P. Düssel, and P. Laskov, “Learning and Classification of Malware Behavior,” International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Paris, 2008.
- J. Kinable and O. Kostakis, “Malware classification based on call graph clustering,” Computer Virology, vol. 7, no. 4, pp. 233-245, 2011.
- Y. Park, D. Reeves, V. Mulukutla, and B. Sundaravel, “Fast malware classification by automated behavioral graph matching,” Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, New York, 2010.
- S. Ranu and A. Singh, “Graphsig: A scalable approach to mining significant subgraphs in large graph databases,” IEEE International Conference on Data Engineering, Shanghai, 2009.
- R. Sokal and F. J. Rohlf, “Biometry: the principles andpractice of statistics in biological research,” San Francisco, 1995.
- C. Wueest, “Does malware still detect virtual machines?,” Symantec Official Blog, 2014.
- Kaspersky Lab, “Malware Classifications,” Kaspersky, [Online]. Available: http://www.kaspersky.com/internet-security-center/threats/malware-classifications.
- “Classification How F-Secure classifies threats,” F-secure, [Online]. Available: https://www.f-secure.com/en/web/labs_global/classification.
|