Representing string computations as graphs for classifying malware.
Justin Del VecchioSteven Y. KoLukasz ZiarekPublished in: MOBILESoft@ICSE (2020)
Keyphrases
- edit distance
- proximity graph
- graph matching
- data structure
- graph edit distance
- graph theoretic
- regular expressions
- graph partitioning
- graph mining
- graph theory
- reverse engineering
- pattern matching
- automatic classification
- context free grammars
- subgraph isomorphism
- pattern recognition
- string edit distance
- graphical models
- malicious code
- labeled graphs
- malware detection
- random graphs
- control flow
- suffix tree
- directed graph
- graph model