2021
DOI: 10.1016/j.cose.2021.102458
|View full text |Cite
|
Sign up to set email alerts
|

Malbert: A novel pre-training method for malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Specifically, it uses BERT [9] based model with static analysis of Android applications to perform binary and multiclass classification. Also called MalBERT but oriented to the detection of malware affecting windows systems using BERT, MalBERT: A novel pre-training method for malware detection [31] uses dynamic analysis with two different datasets with more than 40 000 samples. Their results show 99.9% detection rate on their datasets and more than 98% under different robustness tests.…”
Section: Discussionmentioning
confidence: 99%
“…Specifically, it uses BERT [9] based model with static analysis of Android applications to perform binary and multiclass classification. Also called MalBERT but oriented to the detection of malware affecting windows systems using BERT, MalBERT: A novel pre-training method for malware detection [31] uses dynamic analysis with two different datasets with more than 40 000 samples. Their results show 99.9% detection rate on their datasets and more than 98% under different robustness tests.…”
Section: Discussionmentioning
confidence: 99%
“…By comparing the test API call sequence with the behavior sequence of malware samples, the malware samples were classifed and detected by the dynamic analysis method. Xu et al [39] detected malicious Windows software through the pretraining model, extracted the application programming interface (API) sequence of malware samples by combining natural language processing (NLP) with the dynamic analysis method, and then conducted experiments on two diferent datasets through the fne-tuning method.…”
Section: Malware Analysis Methods Based On Dynamic Analysismentioning
confidence: 99%
“…In recent years, with the advancement of deep learning technologies, researchers have begun employing deep neural networks for malware detection. Applications such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and large pre-trained models from natural language processing have been applied to the task of detecting malware API sequences [ 10 , 11 , 12 , 13 ]. Although researchers have achieved excellent results using API sequence features in malware detection tasks, there are still research gaps in classifying different types of malware and detecting unknown attacks.…”
Section: Introductionmentioning
confidence: 99%