Research Article

A Malware and Variant Detection Method Using Function Call Graph Isomorphism

Table 3

Detection result of malware variants.

Malware familySignatureNumber of malware variantsNumber of identified variantsDetection rate (%)

Virus.Win32.MooderVirus.Win32.Mooder.c10880
Trojan.Win32.BHOLampTrojan.Win32.BHOLamp.mx251872
Backdoor.Win32.SmallBackdoor.Win32.Small.acp15815799.3
Trojan-Downloader.Win32.ZlobTrojan-Downloader.Win32.Zlob.qlr462452.2