Research Article

A Malware and Variant Detection Method Using Function Call Graph Isomorphism

Table 5

Experimental results comparisons.

DatasetNGED ≤ 0.05NGED ≤ 0.1NGED ≤ 0.2Our method
TPR (%)FPR (%)TPR (%)FPR (%)TPR (%)FPR (%)TPR (%)FPR (%)

D283.3083.3088.8083.30
D386.6089.1090.1086.60
D51000.41008.310037.11000