NAECON 2018 - IEEE National Aerospace and Electronics Conference 2018
DOI: 10.1109/naecon.2018.8556657
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malicious Assembly with Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Recent works, including our own, have shown that classifying malware images responds well to convolution [1] . Therefore, instead of using a LSTM, it is possible to use the Convolutional LSTM (from now on, ConvLSTM).…”
Section: Network Architecturementioning
confidence: 84%
See 4 more Smart Citations
“…Recent works, including our own, have shown that classifying malware images responds well to convolution [1] . Therefore, instead of using a LSTM, it is possible to use the Convolutional LSTM (from now on, ConvLSTM).…”
Section: Network Architecturementioning
confidence: 84%
“…The author also notes that the test set was limited to a certain size of binaries and that future work should expand to any length of binaries. In our own work, which this paper extends, we presented up to 88% accuracy in classifying malware on the same data from the Microsoft Malware Classification Challenge [1] . The largest issue from that work was the large amount of padding used.…”
Section: Related Workmentioning
confidence: 89%
See 3 more Smart Citations