MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) 2018
DOI: 10.1109/milcom.2018.8599785
|View full text |Cite
|
Sign up to set email alerts
|

Robust Neural Malware Detection Models for Emulation Sequence Learning

Abstract: Malicious software, or malware, presents a continuously evolving challenge in computer security. These embedded snippets of code in the form of malicious files or hidden within legitimate files cause a major risk to systems with their ability to run malicious command sequences. Malware authors even use polymorphism to reorder these commands and create several malicious variations. However, if executed in a secure environment, one can perform early malware detection on emulated command sequences. The models pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…The baseline file classifier and event classifier employed in this work use the LSTM-based recurrent neural network architectures proposed by (Athiwaratkun and Stokes 2017). Recurrent models which proposed combining a CNN and an LSTM were proposed by (Kolosnjaji et al 2016) and (Agrawal et al 2018).…”
Section: Related Workmentioning
confidence: 99%
“…The baseline file classifier and event classifier employed in this work use the LSTM-based recurrent neural network architectures proposed by (Athiwaratkun and Stokes 2017). Recurrent models which proposed combining a CNN and an LSTM were proposed by (Kolosnjaji et al 2016) and (Agrawal et al 2018).…”
Section: Related Workmentioning
confidence: 99%
“…An anti malware engine generates a very long API call sequences which is a problem for detecting malware. The problem is solved in [294] using neural malware detection models. In this paper, experiments were conducted using different end to end models.…”
Section: ) Deep Neural Network (Dnn)mentioning
confidence: 99%
“…On the other hand, the dynamic approach executes the binary in a controlled environment to collect features like API call traces, network-related information, memory and register usage, etc. [13,14,15]. While static analysis could be undermined by obfuscation, dynamic analysis is proven to be resilient against heavily packed malware but could be time consuming.…”
Section: Introductionmentioning
confidence: 99%