2022
DOI: 10.1016/j.jisa.2021.103063
|View full text |Cite
|
Sign up to set email alerts
|

DTMIC: Deep transfer learning for malware image classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…Malware detection made substantial use of the concept of transfer learning. By employing the readily accessible pre-trained models such as VGG16 [ 39 , 41 , 45 , 46 ], Inception-V3 [ 46 ], Xception [ 51 , 52 , 62 ], ResNet [ 24 , 37 , 39 , 43 , 46 , 52 ], and others, existing works exploited transfer learning in the form of feature extraction or classification. These pre-trained models were typically developed using sizable image datasets outside the domain of our actual work.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Malware detection made substantial use of the concept of transfer learning. By employing the readily accessible pre-trained models such as VGG16 [ 39 , 41 , 45 , 46 ], Inception-V3 [ 46 ], Xception [ 51 , 52 , 62 ], ResNet [ 24 , 37 , 39 , 43 , 46 , 52 ], and others, existing works exploited transfer learning in the form of feature extraction or classification. These pre-trained models were typically developed using sizable image datasets outside the domain of our actual work.…”
Section: Methodsmentioning
confidence: 99%
“…Such a combination of NN was not previously utilized in the domain of malware detection. Previous works included extensive usage of CNN, CNN-based pre-trained models [ 25 , 37 , 39 , 41 , 43 , 44 , 45 , 46 , 50 , 52 , 62 ], shallow models such as Logistic Regression, Random Forest, Decision Tree, Bagging, SVM, etc., or an ensemble of these shallow models [ 35 , 42 , 48 , 57 ].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In vision-based malware identification algorithms, the Android malware APKs or their extracted features are converted to visual 2D digital images before the classification and detection process. Therefore, the main features of the Android malware APKs can be extracted and obtained by the unzipping or decompilation processes [ 17 , 18 ]. Then, the resulting 1D binary vectors of the extracted features (i.e., Android manifest, SMALI, and Classes.dex) are transformed to 2D vectors (grayscale images).…”
Section: Introductionmentioning
confidence: 99%
“…Technique: CNN + RNN • Image representation: RGB image • Dataset: Microsoft Big 2015 • Malware format: Byte file (hexadecimal of the binary content), Assembly Code • Detecting Malware targeting: Windows • Feature extraction: SEResNet50 + Bi-LSTM • Classifier: Sigmoid • Result: 98.31% accuracy Kumar et al[41] proposed the DTMIC model, which uses a pre-trained CNN model VGG16 to perform feature extraction from the images. Extracted features are further fed into a fully-connected layer and then passed to the SoftMax classifier to identify the malware family.…”
mentioning
confidence: 99%