2019 IEEE International Conference on Big Data (Big Data) 2019
DOI: 10.1109/bigdata47090.2019.9006132
|View full text |Cite
|
Sign up to set email alerts
|

Would a File by Any Other Name Seem as Malicious?

Abstract: Successful malware attacks on information technology systems can cause millions of dollars in damage, the exposure of sensitive and private information, and the irreversible destruction of data. Antivirus systems that analyze a file's contents use a combination of static and dynamic analysis to detect and remove/remediate such malware. However, examining a file's entire contents is not always possible in practice, as the volume and velocity of incoming data may be too high, or access to the underlying file con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…These models typically consist of neural networks that determine whether or not a given binary is malicious or benign based on various, defining features of that binary. For instance, certain models run inference over PE header values, assembly code, network traffic, and even the names of binaries [2,36]. Others follow a dynamic approach and perform manual feature engineering of API calls [37].…”
Section: Background and Related Workmentioning
confidence: 99%
“…These models typically consist of neural networks that determine whether or not a given binary is malicious or benign based on various, defining features of that binary. For instance, certain models run inference over PE header values, assembly code, network traffic, and even the names of binaries [2,36]. Others follow a dynamic approach and perform manual feature engineering of API calls [37].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Toward this goal, we needed to minimize memory use and model size in memory, as well as reliance on any GPU resources. This allows analysts who take "fly-away" kits with them to unfamiliar networks to begin investigations into the network, encountering whatever novel malware that may be present [17]. We also need the tool to produce Yara rules within minutes, as our experience has been that analysts will not, in general, use tools requiring them to wait hours or more.…”
Section: Autoyara Designmentioning
confidence: 99%