2019
DOI: 10.25046/aj040506
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malicious Assembly using Convolutional, Recurrent Neural Networks

Abstract: We present findings on classifying the class of executable code using convolutional, recurrent neural networks by creating images from only the .text section of executables and dividing them into standard-size windows, using minimal preprocessing. We achieve up to 98.24% testing accuracy on classifying 9 types of malware, and 99.50% testing accuracy on classifying malicious vs. benign code. Then, we find that a recurrent network may not entirely be necessary, opening the door for future neural network architec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 16 publications
1
1
0
Order By: Relevance
“…Our models that achieved these success, however, contained a large number of parameters, so they required a large amount of memory and time to train. These are results that we have observed in a previous work [17]. For the model to be practical it must be fast and lean.…”
Section: Network Architecturesupporting
confidence: 82%
See 1 more Smart Citation
“…Our models that achieved these success, however, contained a large number of parameters, so they required a large amount of memory and time to train. These are results that we have observed in a previous work [17]. For the model to be practical it must be fast and lean.…”
Section: Network Architecturesupporting
confidence: 82%
“…This work was a proof-of-concept that only the .text section was necessary for classification and we expand that work to achieve better performance here. We then continued on this work with recurrent neural network models, finding that they were more successful but also that there was strong evidence that the recurrent nature of the networks was not necessary for the success of the model [17].…”
Section: Figure 1 Example Executable Code As An Imagementioning
confidence: 99%