Research Article
A Novel Malware Classification Method Based on Crucial Behavior
Table 1
Summary of malware detection and classification work.
| Approach | Features | Note |
| Eskandari et al. [27] | API call sequence | Simple, vulnerable to reorder or irrelevant API calls | Lee et al. [28] | API call sequence | Hansen et al. [29] | API call sequence; arguments; frequency | Amin [30, 31] | Opcode | End-to-end learning | D’Angelo et al. [32] | API call sequence-based image | Park et al. [34] | Behavioral graph | High dimensional features can bring more calculations | Elhadi et al. [11] | API call graph | Nikolopoulos and Polenakis [35] | System call dependency graph | Fredrikson et al. [37] | Optimally discriminative specification | Simplified representation of behavior graphs | Alam et al. [40] | Control flow graph-based feature | Ding et al. [41] | API dependency graph |
|
|