2019 IEEE 31st International Conference on Tools With Artificial Intelligence (ICTAI) 2019
DOI: 10.1109/ictai.2019.00088
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy Malware Detection using RNN-Based Automated Localized Feature Extraction and Classifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…They have also used ML-models to classify applications and supported their claim. In [6,7] authors detect stealthy malwares by converting malware binaries into grayscale images and then extracting patterns by performing raster scanning. The grayscale images are further represented as sequence of patterns which are further used for sequence classification using RNN-LSTM's.…”
Section: Classification Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…They have also used ML-models to classify applications and supported their claim. In [6,7] authors detect stealthy malwares by converting malware binaries into grayscale images and then extracting patterns by performing raster scanning. The grayscale images are further represented as sequence of patterns which are further used for sequence classification using RNN-LSTM's.…”
Section: Classification Resultsmentioning
confidence: 99%
“…The hardware security discipline in recent years experienced a plethora of threats like the Malware attacks [1,2,3,4,5,6,7], Side-Channel Attacks [8,9,10,11], Hardware Trojan attacks [12], reverse engineering threats [13,14,15] and so on. We focus on the malware detection technique here along with some state-of-the-art works.…”
Section: Introductionmentioning
confidence: 99%
“…LSTM networks have been widely applied to various real-world applications and achieved state-of-theart performances such as speech recognition [16], handwriting recognition [17]. In [18], LSTM networks are used to process localized features and perform the classification to detect stealthy malware. In this paper, we employed LSTM to extract general information from local features of each block in disassembled CFGs of binaries and further use the information for similarity detection.…”
Section: Lstm Recurrent Neural Networkmentioning
confidence: 99%
“…The hardware security domain in recent years has experienced a plethora of threats Side-Channel Attacks [1,2], Malware attacks [3][4][5][6][7][8][9], Hardware Trojan attacks [10], reverse engineering threats [11][12][13] and so on. Among multiple threats, the side-channel attacks (SCAs) is one of the pivotal threats due to it's capability to exploit the design despite being introduced in the market post-validation.…”
Section: Introductionmentioning
confidence: 99%