Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security 2017
DOI: 10.1145/3128572.3140442
|View full text |Cite
|
Sign up to set email alerts
|

Learning the PE Header, Malware Detection with Minimal Domain Knowledge

Abstract: Many efforts have been made to use various forms of domain knowledge in malware detection. Currently there exist two common approaches to malware detection without domain knowledge, namely byte ngrams and strings. In this work we explore the feasibility of applying neural networks to malware detection and feature learning. We do this by restricting ourselves to a minimal amount of domain knowledge in order to extract a portion of the Portable Executable (PE) header. By doing this we show that neural networks c… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
95
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(121 citation statements)
references
References 49 publications
1
95
1
Order By: Relevance
“…For features, one study combines DNN's with random projections [9] and another with two dimensional binary PE program features [24]. Research has also been done on a variety of file types, such as Android and PE files [5], [16], [22], [29]. While the specifics can vary greatly, all machine learning approaches to malware detection share the same central vulnerability to AEs.…”
Section: A Malware Detection Using Neural Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…For features, one study combines DNN's with random projections [9] and another with two dimensional binary PE program features [24]. Research has also been done on a variety of file types, such as Android and PE files [5], [16], [22], [29]. While the specifics can vary greatly, all machine learning approaches to malware detection share the same central vulnerability to AEs.…”
Section: A Malware Detection Using Neural Networkmentioning
confidence: 99%
“…Security researchers have generated malware AEs using an array of machine learning approaches such as reinforcement learning, genetic algorithms and supervised learning including neural networks, decision trees and SVM [5], [10], [12]- [14], [22], [24], [27], [28]. These approaches, with the exception of [12], [13], are black box.…”
Section: Adversarial Malwarementioning
confidence: 99%
“…Raff et al [49] addressed the problem of detecting malicious Portable Executable (PE) files using a DL model containing an embedding layer. Their classifier uses the PE header only, whose raw bytes are used as input to a DL model, containing a W2V-style embedding layer.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, the need for techniques that generalize to previously unseen malware samples has led to detection approaches that utilize machine learning techniques [25,26,38]. Malware analysis can be broadly divided into two categories: code (static) analysis and behavioral (dynamic) analysis.…”
Section: Introductionmentioning
confidence: 99%