Research Article
A Malware and Variant Detection Method Using Function Call Graph Isomorphism
Table 5
Experimental results comparisons.
| Dataset | NGED ≤ 0.05 | NGED ≤ 0.1 | NGED ≤ 0.2 | Our method | TPR (%) | FPR (%) | TPR (%) | FPR (%) | TPR (%) | FPR (%) | TPR (%) | FPR (%) |
| D2 | 83.3 | 0 | 83.3 | 0 | 88.8 | 0 | 83.3 | 0 | D3 | 86.6 | 0 | 89.1 | 0 | 90.1 | 0 | 86.6 | 0 | D5 | 100 | 0.4 | 100 | 8.3 | 100 | 37.1 | 100 | 0 |
|
|