scispace - formally typeset
Search or ask a question
Author

Joris Kinable

Bio: Joris Kinable is an academic researcher from Eindhoven University of Technology. The author has contributed to research in topics: Vehicle routing problem & Constraint programming. The author has an hindex of 13, co-authored 30 publications receiving 702 citations. Previous affiliations of Joris Kinable include University of Twente & Carnegie Mellon University.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors proposed a call graph clustering approach to detect malware variants by abstracting certain variations away, enabling the detection of structural similarities between samples, which can be used to analyse the emergence of new malware families.
Abstract: Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based on call graph clustering. By representing malware samples as call graphs, it is possible to abstract certain variations away, enabling the detection of structural similarities between samples. The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. To compare call graphs mutually, we compute pairwise graph similarity scores via graph matchings which approximately minimize the graph edit distance. Next, to facilitate the discovery of similar malware samples, we employ several clustering algorithms, including k-medoids and Density-Based Spatial Clustering of Applications with Noise (DBSCAN). Clustering experiments are conducted on a collection of real malware samples, and the results are evaluated against manual classifications provided by human malware analysts. Experiments show that it is indeed possible to accurately detect malware families via call graph clustering. We anticipate that in the future, call graphs can be used to analyse the emergence of new malware families, and ultimately to automate implementation of generic detection schemes.

203 citations

Journal ArticleDOI
TL;DR: This paper defines the school bus routing problem (SBRP) as a variant of the vehicle routing problem in which three simultaneous decisions have to be made: to determine the set of stops to visit, and to determine routes that lie along the chosen stops, so that the total traveled distance is minimized.

144 citations

Journal ArticleDOI
TL;DR: JGraphT as discussed by the authors is a programming library that contains very efficient and generic graph data structures along with a large collection of state-of-the-art algorithms, such as shortest paths, spanning trees, graph and subgraph isomorphism, matching and flow problems, approximation algorithms for NP-hard problems such as independent set and the traveling salesman problem.
Abstract: Mathematical software and graph-theoretical algorithmic packages to efficiently model, analyze, and query graphs are crucial in an era where large-scale spatial, societal, and economic network data are abundantly available. One such package is JGraphT, a programming library that contains very efficient and generic graph data structures along with a large collection of state-of-the-art algorithms. The library is written in Java with stability, interoperability, and performance in mind. A distinctive feature of this library is its ability to model vertices and edges as arbitrary objects, thereby permitting natural representations of many common networks, including transportation, social, and biological networks. Besides classic graph algorithms such as shortest-paths and spanning-tree algorithms, the library contains numerous advanced algorithms: graph and subgraph isomorphism, matching and flow problems, approximation algorithms for NP-hard problems such as independent set and the traveling salesman problem, and several more exotic algorithms such as Berge graph detection. Due to its versatility and generic design, JGraphT is currently used in large-scale commercial products, as well as noncommercial and academic research projects. In this work, we describe in detail the design and underlying structure of the library, and discuss its most important features and algorithms. A computational study is conducted to evaluate the performance of JGraphT versus several similar libraries. Experiments on a large number of graphs over a variety of popular algorithms show that JGraphT is highly competitive with other established libraries such as NetworkX or the BGL.

80 citations

Journal ArticleDOI
TL;DR: The present paper reports on the competition and provides an analysis of the submitted algorithms, and a study of their common elements, and makes all benchmark datasets and results publicly available, so that further research on the MRCMPSP is stimulated.
Abstract: Scheduling projects is a difficult and time consuming process, and has far-reaching implications for any organization's operations. By generalizing various aspects of project scheduling, decision makers are enabled to capture reality and act accordingly. In the context of the MISTA 2013 conference, the first MISTA challenge, organized by the authors, introduced such a general problem model: the Multi-Mode Resource-Constrained Multi-Project Scheduling Problem (MRCMPSP). The present paper reports on the competition and provides a discussion on its results. Furthermore, it provides an analysis of the submitted algorithms, and a study of their common elements. By making all benchmark datasets and results publicly available, further research on the MRCMPSP is stimulated.

60 citations

Journal ArticleDOI
TL;DR: The results indicate that the decomposition approach significantly outperforms other exact approaches presented in the literature, in terms of solution quality and computation time.

50 citations


Cited by
More filters
Proceedings ArticleDOI
22 Jan 2006
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Abstract: We will review some of the major results in random graphs and some of the more challenging open problems. We will cover algorithmic and structural questions. We will touch on newer models, including those related to the WWW.

7,116 citations

Journal ArticleDOI
TL;DR: A state-of-the-art survey of the Benders Decomposition algorithm, emphasizing its use in combinatorial optimization and introducing a taxonomy of algorithmic enhancements and acceleration strategies based on the main components of the algorithm.

506 citations

06 Mar 2014
TL;DR: In this article, the academic achievements have been and continue to be well above Western Australian and National averages, while the pastoral care programs that operate in the school teach children the specific social and emotional skills they need in order to develop and maintain friendships and a strong sense of selfworth.
Abstract: Our school prides itself on providing the best opportunities for each child. The academic achievements have been and continue to be well above Western Australian and National averages, while the pastoral care programs that operate in the school teach children the specific social and emotional skills they need in order to develop and maintain friendships and a strong sense of selfworth. Students have a strong sense of pride in the school and display significant support for each other. Student success is valued, supported and celebrated by all.

399 citations

Proceedings ArticleDOI
04 Nov 2013
TL;DR: This paper proposes a method for malware detection based on efficient embeddings of function call graphs with an explicit feature map inspired by a linear-time graph kernel that outperforms several related approaches and detects 89% of the malware with few false alarms, while also allowing to pin-point malicious code structures within Android applications.
Abstract: The number of malicious applications targeting the Android system has literally exploded in recent years. While the security community, well aware of this fact, has proposed several methods for detection of Android malware, most of these are based on permission and API usage or the identification of expert features. Unfortunately, many of these approaches are susceptible to instruction level obfuscation techniques. Previous research on classic desktop malware has shown that some high level characteristics of the code, such as function call graphs, can be used to find similarities between samples while being more robust against certain obfuscation strategies. However, the identification of similarities in graphs is a non-trivial problem whose complexity hinders the use of these features for malware detection. In this paper, we explore how recent developments in machine learning classification of graphs can be efficiently applied to this problem. We propose a method for malware detection based on efficient embeddings of function call graphs with an explicit feature map inspired by a linear-time graph kernel. In an evaluation with 12,158 malware samples our method, purely based on structural features, outperforms several related approaches and detects 89% of the malware with few false alarms, while also allowing to pin-point malicious code structures within Android applications.

311 citations

Journal ArticleDOI
TL;DR: This survey aims at providing a systematic and detailed overview of machine learning techniques for malware detection and in particular, deep learning techniques with special emphasis on deep learning approaches.

291 citations