Identifying Malicious Source Code Using LZJD
dc.contributor.advisor | Nicholas, Charles | |
dc.contributor.author | Roca, Alexander James | |
dc.contributor.department | Computer Science and Electrical Engineering | |
dc.contributor.program | Computer Science | |
dc.date.accessioned | 2022-09-29T15:37:51Z | |
dc.date.available | 2022-09-29T15:37:51Z | |
dc.date.issued | 2021-01-01 | |
dc.description.abstract | This work presents a proof-of-concept of the use of Lempel-Ziv Jaccard Distance, or LZJD, as a means of detecting malicious source code by comparing the suspect source code to a library of known malicious source code. In this paper we detail our method of making these comparisons, evaluate how well it works, and suggest some potential methods of improvement for future work. We conclude that LZJD does appear to be effective at identifying similar files, but that it appears to struggle when attempting to aggregate the scores to compare entire source code projects. | |
dc.format | application:pdf | |
dc.genre | theses | |
dc.identifier | doi:10.13016/m2dvzs-ihk8 | |
dc.identifier.other | 12474 | |
dc.identifier.uri | http://hdl.handle.net/11603/25974 | |
dc.language | en | |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Theses and Dissertations Collection | |
dc.relation.ispartof | UMBC Graduate School Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu | |
dc.source | Original File Name: Roca_umbc_0434M_12474.pdf | |
dc.subject | LZJD | |
dc.subject | Malware Analysis | |
dc.subject | Similarity | |
dc.subject | Source Code | |
dc.title | Identifying Malicious Source Code Using LZJD | |
dc.type | Text | |
dcterms.accessRights | Distribution Rights granted to UMBC by the author. | |
dcterms.accessRights | Access limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission. |