Malware Analysis Using Artificial Intelligence and Deep Learning 2020
DOI: 10.1007/978-3-030-62582-5_1
|View full text |Cite
|
Sign up to set email alerts
|

A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Algorithm 1: Align Byte By Width [30,196] Input: data, width Output: aligned_byte, byte data had been aligned by width 1 size ← len(data) ; / * get length of byte data * / 2 if size is 0 then This collection of simulations aims at developing a model that is able to detect whether a file is malware or not. This project trains a malware classifier first and then detects files' Studies showed that fine-tuned and transferred learning achieve good results in image-based malware classification [31]- [33] but also outperform other traditional networks [34].…”
Section: F Deep Ocean Malware Detectormentioning
confidence: 99%
“…Algorithm 1: Align Byte By Width [30,196] Input: data, width Output: aligned_byte, byte data had been aligned by width 1 size ← len(data) ; / * get length of byte data * / 2 if size is 0 then This collection of simulations aims at developing a model that is able to detect whether a file is malware or not. This project trains a malware classifier first and then detects files' Studies showed that fine-tuned and transferred learning achieve good results in image-based malware classification [31]- [33] but also outperform other traditional networks [34].…”
Section: F Deep Ocean Malware Detectormentioning
confidence: 99%
“…In this section, we provide a brief introduction to each of the learning techniques considered in this paper. Additional details on most of the learning techniques discussed here can be found in [27], which includes examples of relevant applications of the techniques. We provide additional references for the techniques discussed below that are not considered in [27].…”
Section: Learning Techniquesmentioning
confidence: 99%