2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2019
DOI: 10.1109/dsn.2019.00020
|View full text |Cite
|
Sign up to set email alerts
|

Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
63
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(63 citation statements)
references
References 26 publications
0
63
0
Order By: Relevance
“…Carratero et al [19] propose their method to diagnose faults in the load-store unit (LSU) which is performed during post-silicon validation, and it only covers design faults. In contrast, SCRIBE [20] is proposed to diagnose intermittent faults during regular operation. After the fault is detected, the program is replayed on the standby core, and a data dependence graph (DDG) is constructed by extracting the runtime information (microstructure-level devices).…”
Section: Fault Diagnosis Methodsmentioning
confidence: 99%
“…Carratero et al [19] propose their method to diagnose faults in the load-store unit (LSU) which is performed during post-silicon validation, and it only covers design faults. In contrast, SCRIBE [20] is proposed to diagnose intermittent faults during regular operation. After the fault is detected, the program is replayed on the standby core, and a data dependence graph (DDG) is constructed by extracting the runtime information (microstructure-level devices).…”
Section: Fault Diagnosis Methodsmentioning
confidence: 99%
“…Classical Deep Learning algorithms such as Convolutional Neural Networks (CNNs) [23] and LSTM networks have been successfully applied to malware detection and classification problems using both static and dynamic analysis data [22]; however, Deep Learning on graphs has been mainly applied to data extracted employing static analysis methods. [24] proposed a malware classification method (MAGIC) based on a modified version of the DGCNN to learn directly from attributed control flow graphs (ACFGs) extracted from disassembled binaries, in which each vertex summarizes code characteristics as numerical values. [25] introduced a malware detection approach using graph embedding to map the control flow graphs (CFGs) extracted from disassembled binaries to low-dimensional vectors as inputs for two stacked denoising autoencoders (SDAs) that are responsible for representation learning.…”
Section: Related Workmentioning
confidence: 99%
“…[28] studied the effectiveness of DGCNNs in processing large-scale graphs with hundreds of thousands of nodes by conducting experiments on malware detection and software defect prediction. Our work follows a similar approach to [24] and shares the same theoretical basis on applying DGCNNs for classification tasks [15]. However, we use the standpoint of dynamic analysis by extracting behavioral graphs from the API call sequences and using both the API call sequences and the behavioral graphs as inputs to a modified version of the DGCNN.…”
Section: Related Workmentioning
confidence: 99%
“…These approaches work best when the code base in question is well-documented and comments are indicative of the actual intent of the code. Attempts in literature employ control flow graphs for software defects [7] and malware detection [8]. Our, representation of code as a control flow graph of basic blocks is different.…”
Section: Introductionmentioning
confidence: 99%