Research Article
A Novel Malware Classification Method Based on Crucial Behavior
Algorithm 1
API call repartition algorithm.
| Input: API call graph () | | Output: // | (1) | Begin | (2) | For to do // represents API call graph in a sample | (3) | Find the root node in | (4) | Find leaf nodes () in | (5) | Extract subgraphs from to leaf nodes | (6) | End | (7) | Obtained all extracted subgraphs | (8) | For to do // represents subgraph and | (9) | If the order in is smaller than | (10) | | (11) | Else | (12) | Divide into | (13) | End | (14) | End | (15) | Output | (16) | End |
|