Research Article

A Novel Malware Classification Method Based on Crucial Behavior

Algorithm 1

API call repartition algorithm.
Input: API call graph ()
Output: //
(1)Begin
(2)For to do // represents API call graph in a sample
(3)  Find the root node in
(4)  Find leaf nodes () in
(5)  Extract subgraphs from to leaf nodes
(6)End
(7) Obtained all extracted subgraphs
(8)For to do // represents subgraph and
(9)  If the order in is smaller than
(10)   
(11)  Else
(12)   Divide into
(13)  End
(14)End
(15) Output
(16)End