Singh et al., 2022 - Google Patents
Static malware analysis using machine and deep learningSingh et al., 2022
View PDF- Document ID
- 11328254468911104776
- Author
- Singh H
- Singh J
- Tewari A
- Publication year
- Publication venue
- Proceedings of International Conference on Computing and Communication Networks: ICCCN 2021
External Links
Snippet
In the era of digital advancement and innovation, malware (malicious software) still poses major threats to users' privacy and leads to many security breaches. Due to the exponential rise in malware attacks, malware analysis and detection continue to be a hot research topic …
- 238000004458 analytical method 0 title abstract description 38
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xiao et al. | Malware detection based on deep learning of behavior graphs | |
| Darem et al. | An adaptive behavioral-based incremental batch learning malware variants detection model using concept drift detection and sequential deep learning | |
| Chowdhury et al. | Malware analysis and detection using data mining and machine learning classification | |
| Meijin et al. | A systematic overview of android malware detection | |
| Alazab | Profiling and classifying the behavior of malicious codes | |
| Ali et al. | Deep learning methods for malware and intrusion detection: A systematic literature review | |
| Hussain et al. | Malware detection using machine learning algorithms for windows platform | |
| Sabhadiya et al. | Android malware detection using deep learning | |
| LeDoux et al. | Malware and machine learning | |
| Zakeri et al. | A static heuristic approach to detecting malware targets | |
| Uysal et al. | Data-driven malware detection for 6G networks: A survey from the perspective of continuous learning and explainability via visualisation | |
| Carlin et al. | Dynamic analysis of malware using run-time opcodes | |
| Dahiya et al. | Android malware analysis and detection: A systematic review | |
| Singh et al. | Static malware analysis using machine and deep learning | |
| Hamza et al. | A survey and taxonomy of program analysis for IoT platforms | |
| Pandiaraja et al. | A graph-based model for discovering host-based hook attacks | |
| Chandran et al. | From static to ai-driven detection: A comprehensive review of obfuscated malware techniques | |
| Gandotra et al. | Tools & Techniques for Malware Analysis and Classification. | |
| Mimura | Impact of benign sample size on binary classification accuracy | |
| Rimon et al. | Malware detection and classification using hybrid machine learning algorithm | |
| Kumar et al. | Zero-day malware classification and detection using machine learning | |
| Gregory Paul et al. | A framework for dynamic malware analysis based on behavior artifacts | |
| Baychev et al. | Spearphishing malware: Do we really know the unknown? | |
| Boodai et al. | Deep learning for malware detection: Literature review | |
| Ravi et al. | Android malware detection with classification based on hybrid analysis and N-gram feature extraction |