A Malware and Variant Detection Method Using Function Call Graph Isomorphism

The huge influx of malware variants are generated using packing and obfuscating techniques. Current antivirus software use byte signature to identify known malware, and this method is easy to be deceived and generally ineffective for identifying malware variants. Antivirus experts use hash signature...

Full description

Bibliographic Details
Main Authors: Jinrong Bai, Qibin Shi, Shiguang Mu
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2019/1043794