2022
DOI: 10.1016/j.cose.2021.102547
|View full text |Cite
|
Sign up to set email alerts
|

Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 22 publications
1
17
0
Order By: Relevance
“…Both signature-based and behavior-based techniques are used for malware detection. The signature-based approach is useful for identifying known threats without producing an excessive number of false alarms [8], but it needs regular manual updates of the database containing rules and signatures. According to [9], a malware detection strategy in the Internet of Things environment based on a similarity hashing algorithm has been presented.…”
Section: A Malware Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Both signature-based and behavior-based techniques are used for malware detection. The signature-based approach is useful for identifying known threats without producing an excessive number of false alarms [8], but it needs regular manual updates of the database containing rules and signatures. According to [9], a malware detection strategy in the Internet of Things environment based on a similarity hashing algorithm has been presented.…”
Section: A Malware Analysismentioning
confidence: 99%
“…Image-based malware classification algorithms can overcome code obfuscation or encoding difficulties, comparable to and more advanced than static analysis approaches [8]. These image-based methods employ static analysis techniques to turn malware samples into image representations [10].…”
Section: B Visualization Techniquementioning
confidence: 99%
“…Next, a CNN classifier is used to classify the grayscale images mapped from the two-dimensional arrays. Jadeite [16] proposes to generate grayscale images from ICFGs of Java bytecode files, which considers the program's semantics information and improves the detection performance. Nevertheless, the image processing-based approach, or even on top of static analysis results with semantic information, makes malware detection a completer black box problem, which limits the exploration of attack laws and increases the difficulty in providing interpretable results.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, dynamic analysis techniques can hardly cover all execution paths and cause more time and resource consumption for the execution environment, which limits the practicality of these methods. Recently, researchers have explored image-based malware detection approaches which leverage the booms of ML algorithms in computer vision [14][15][16]. These approaches usually covert raw malware binaries into pixel-based images via various transformation methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation