File:Malware VisualizationTaxonomy with References.png: Difference between revisions
copyright |
No edit summary |
||
Line 6: | Line 6: | ||
== Source: == | == Source: == | ||
Redrawn by the authors based on Wagner, M.; Fischer, F.; Luh, R.; Haberson, A.; Rind, A.; Keim, D. A. & Aigner, W.: [[A Survey of Visualization Systems for Malware Analysis]], Borgo, R.; Ganovelli, F. & Viola, I. (eds.), Proceedings of Eurographics Conference on Visualization (EuroVis) State of The Art Reports, p. 105-125, Cagliari, Italy, Eurographics, 2015. doi:10.2312/eurovisstar.20151114 |
Latest revision as of 14:02, 24 March 2017
Summary
Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automated malware detection systems. While the first category tackles the problem of understanding the behavior of an individual malware sample for forensics, the latter two focus on the identification of common behavior for malware classification.
Copyright status:
This file is licensed under the Creative Commons Attribution 4.0 International license.
Source:
Redrawn by the authors based on Wagner, M.; Fischer, F.; Luh, R.; Haberson, A.; Rind, A.; Keim, D. A. & Aigner, W.: A Survey of Visualization Systems for Malware Analysis, Borgo, R.; Ganovelli, F. & Viola, I. (eds.), Proceedings of Eurographics Conference on Visualization (EuroVis) State of The Art Reports, p. 105-125, Cagliari, Italy, Eurographics, 2015. doi:10.2312/eurovisstar.20151114
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 13:44, 24 March 2017 | 2,959 × 1,098 (165 KB) | Arind (talk | contribs) | Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automate... |
You cannot overwrite this file.
File usage
The following page uses this file: