2017
DOI: 10.48550/arxiv.1710.09435
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Malware Detection by Eating a Whole EXE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
95
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(108 citation statements)
references
References 0 publications
2
95
0
Order By: Relevance
“…Raff et al [16] propose MalConv, a deep learning model which discriminates programs based on their byte representation, without extracting any feature. The intuition of this approach is based on spatial properties of binary programs: (i) code, and data may be mixed, and it is difficult to extract proper features; (ii) there is correlation between different portions of the input program; (iii) binaries may have different length, as they are strings of bytes.…”
Section: Deep Learning For Malware Detection In Binary Filesmentioning
confidence: 99%
See 2 more Smart Citations
“…Raff et al [16] propose MalConv, a deep learning model which discriminates programs based on their byte representation, without extracting any feature. The intuition of this approach is based on spatial properties of binary programs: (i) code, and data may be mixed, and it is difficult to extract proper features; (ii) there is correlation between different portions of the input program; (iii) binaries may have different length, as they are strings of bytes.…”
Section: Deep Learning For Malware Detection In Binary Filesmentioning
confidence: 99%
“…In particular, we rely upon an explainable technique known as feature attribution [12] to identify the most influential input features contributing to each decision. We focus on a case study related to the detection of Windows Portable Executable (PE) malware files, using a recently-proposed convolutional neural network named MalConv [16]. This network is trained directly on the raw input bytes to discriminate between malicious and benign PE files, reporting good classification accuracy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this regard, Anderson et al [4] provide Ember, a very good dataset to train ML algorithms. On the other hand, Raff et al [5] use Natural Language Processing tools to analyse bit sequences extracted from binary files. Their MalConv algorithm gives very good results but requires a lot of computing power to train it.…”
Section: State Of Artmentioning
confidence: 99%
“…6) Slack Attacks: A byte-based convolutional neural network (MalConv) was introduced in [64]. Unlike image perturbation attacks [29], where the fidelity of the image is of little concern, attacks that alter the binaries of malware files must maintain the semantic fidelity of the original file because altering the bytes of the malware arbitrarily could affect the malicious effect of the malware.…”
Section: A Adversarial Attacks On ML For Endpoint Protectionmentioning
confidence: 99%