Acknowledgement
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government (MSIT)(No. NRF-2021R1F1A1062954).
References
- "Malware hidden site detection trend report in the second half of 2020," Korea Internet & Security Agency, 2021. online: https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=35872
- M. Singh and S. Kim, "Security analysis of intelligent vehicles: Challenges and scope," 2017 International SoC Design Conference (ISOCC), pp.5-8 2017. DOI: 10.1109/ISOCC.2017.8368805
- E. Amer and I. Zelinka, "A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence," Computers & Security, 2020. DOI: 10.1016/j.cose.2020.101760
- A. Ahmed, E. Elhadi1, M. A. Maarof1 and B. I. A. Barry, "Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph," International Journal of Security and Its Applications, vol.7, no.5, pp.29-42, 2013. DOI: 10.14257/ijsia.2013.7.5.03
- Lee, Taejin, "Trends in intelligent malware analysis technology using machine learning," Korea Institute of Information Security and Cryptology, Vol.28, No.2, pp.12-19, 2018.
- "Malware characteristic information for using artificial intelligence technology," Korea Internet & Security Agency, 2021. online: https://krcert.or.kr/data/reportView.do?bulletin_writing_sequence=36076
- P. Deshpande, "Metamorphic Detection Using Function Call Graph Analysis," Master's Theses and Graduate Research, 2013, online: https://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1334&context=etd_projects
- D. Rajeswaran, "Function Call Graph Score for Malware Detection," Master's Theses and Graduate Research, 2015, online: https://core.ac.uk/download/pdf/70424797.pdf
- D. Rajeswaran, F. D. Troia, T. H. Austin and M. Stamp, "Function Call Graphs Versus Machine Learning for Malware Detection," In book: Guide to Vulnerability Analysis for Computer Networks and Systems, pp.259-279, 2018. DOI: 10.1007/978-3-319-92624-7_11
- J. Bai ,Q. Shi, and S. Mu, "A Malware and Variant Detection Method Using Function Call Graph Isomorphism," Security and Communication Networks, vol.2019. 2019. DOI: 10.1155/2019/1043794
- Z. Liu and J. Zhou, "Introducation to Graph Neural Networks," Morgan & Claypool Publishers, 2020.
- M. Caia, Y. Jiangab, C. Gaoa, H. Lia, and W. Yuan, "Learning features from enhanced function call graphs for Android malware detection," Neurocomputing, vol.423, pp.301-307, 2021. DOI: 10.1016/j.neucom.2020.10.054
- T. Toma and M Islam, "An efficient mechanism of generating call graph for JavaScript using dynamic analysis in web application," International Conference on Informatics, Electronics & Vision (ICIEV), 2014. DOI: 10.1109/ICIEV.2014.6850807
- D. Andriesse, X. Chen, V. Veen, A. Slowinska, and H. Bos, "An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries," the Proceedings of the 25th USENIX Security Symposium, pp.583-600, 2016. DOI: 10.5555/3241094.3241140
- S. Yang, S. Li, W. Chen, and Y. LIU, "A Real-Time and adaptive-Learning Malware Detection Method Based On API-Pair Graph," IEEE Access, vol.8, pp.120-135, 2020. DOI: 10.1109/ACCESS.2020.3038453