2021
DOI: 10.1007/978-3-030-92273-3_51
|View full text |Cite
|
Sign up to set email alerts
|

A Hierarchical Graph-Based Neural Network for Malware Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…In this part, our model employs AutoGNN with Explicit Link Information [46] algorithm to construct edge feature engineering of the multi-source heterogeneous network. The AutoGNN model can automate the appropriate GNN architecture design for the given data [47] and introduce edge embedding in an explicit way.…”
Section: Edge Feature Representationmentioning
confidence: 99%
“…In this part, our model employs AutoGNN with Explicit Link Information [46] algorithm to construct edge feature engineering of the multi-source heterogeneous network. The AutoGNN model can automate the appropriate GNN architecture design for the given data [47] and introduce edge embedding in an explicit way.…”
Section: Edge Feature Representationmentioning
confidence: 99%
“…Although FCGs offer a global view of function calls executed by the program, they generally lack the intra-procedural information that CFGs provide. To address this, some approaches can be employed by jointly using FCGs and CFGs, where embeddings from CFGs are integrated into the nodes of the FCGs, to capture both intra-procedural and inter-procedural semantic [32,33,53]. In the case of Android malware analysis, a prevalent approach is to statically extract the API call sequences from the application and represent them using a FCG [56,58,59,82].…”
Section: Common Graphmentioning
confidence: 99%
“…A similar CFG based on an assembly is employed in the paper [53]. First, the semantic of functions is computed using random walk and the BERT [138] language model.…”
Section: Cfg Approaches For Windows Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…al. [23] proposed the Rule-based Representation Learner (RRL) which automatically learns interpretable nonfuzzy rules for data representation and classification. In Wei et.…”
Section: Introductionmentioning
confidence: 99%