2022
DOI: 10.1186/s13677-022-00349-8
|View full text |Cite
|
Sign up to set email alerts
|

A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization

Abstract: Android is the most widely used mobile platform, making it a prime target for malicious attacks. Therefore, it is imperative to effectively circumvent these attacks. Recently, machine learning has been a promising solution for malware detection, which relies on distinguishing features. While machine learning-based malware scanners have a large number of features, adversaries can avoid detection by using feature-related expertise. Therefore, one of the main tasks of the Android security industry is to consisten… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…Ullah et al [8] and Mani et al [9] provide perspectives on securing advanced computational models against emerging threats. These studies underscore the importance of proactive and innovative defenses in protecting sophisticated computational systems.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…Ullah et al [8] and Mani et al [9] provide perspectives on securing advanced computational models against emerging threats. These studies underscore the importance of proactive and innovative defenses in protecting sophisticated computational systems.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…Consequently, creating new skills that can reliably detect malicious behavior is one of the main tasks of the Android security department. Ullah et al [17] presented a novel feature representation approach for malware identification that combines API-Call Graphs (ACGs) with byte-level picture representation.…”
Section: Mishra Et Al [10] 2020mentioning
confidence: 99%
“…Opting for cloud-based detection instead of more traditional methods has many advantages. With the advent of cloud computing, which makes use of processing power and enormous databases, malware detection has the potential to become more rapid and accurate [17]. Computers, mobile devices, and cyber-physical systems can all benefit from the cloud-based method's enhanced object identification capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…To regulate data flow, cache data, offload data, secure connections, and not lose connections, dynamic network access was essential. [22][23][24] Their study describes a novel, distributed resource allocation method for V2V communications 25 informed by DRL. This method is adaptable to both unicast and broadcast settings.…”
Section: Literature Reviewmentioning
confidence: 99%
“…DRL blends deep learning and reinforcement learning. To regulate data flow, cache data, offload data, secure connections, and not lose connections, dynamic network access was essential 22‐24 …”
Section: Literature Reviewmentioning
confidence: 99%