2015 10th International Conference on Malicious and Unwanted Software (MALWARE) 2015
DOI: 10.1109/malware.2015.7413680
|View full text |Cite
|
Sign up to set email alerts
|

Deep neural network based malware detection using two dimensional binary program features

Abstract: Malware remains a serious problem for corporations, government agencies, and individuals, as attackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
327
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 503 publications
(331 citation statements)
references
References 28 publications
2
327
0
2
Order By: Relevance
“…Saxe and Berlin [16] instead proposed a method to distinguish malware from benign one with a neural network. In their research, entropy histogram is calculated from binary data and the number of callings of the contextual byte data, and metadata of execution files and DLL import are extracted.…”
Section: Related Workmentioning
confidence: 99%
“…Saxe and Berlin [16] instead proposed a method to distinguish malware from benign one with a neural network. In their research, entropy histogram is calculated from binary data and the number of callings of the contextual byte data, and metadata of execution files and DLL import are extracted.…”
Section: Related Workmentioning
confidence: 99%
“…Saxe et al [33] proposed a method to distinguish malware from benign software based on a neural network, deep learning approach. Their system uses four different types of complementary static features from benign and malicious binaries.…”
Section: Related Workmentioning
confidence: 99%
“…Our second hypothesis is that the file-based features used by [17] simply do not contain the same level of information as the extracted features used in the EMBER corpus. They use the same feature approach as the seminal work by Saxe and Berlin [26], which uses a histogram of entropy values, a histogram of string lengths, a histogram of entropy standard deviations, and 256 dimensional bin to hash values extractable from the PE-header. This last set of 256 features will have collisions, as it corresponds to feature-hashing into a small dimensional space.…”
Section: Combining File Names With Ember Featuresmentioning
confidence: 99%