2019 IEEE Symposium on Visualization for Cyber Security (VizSec) 2019
DOI: 10.1109/vizsec48167.2019.9161583
|View full text |Cite
|
Sign up to set email alerts
|

Image-based Malware Classification: A Space Filling Curve Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…O'Shaughnessy [32] proposed a novel method for visualizing and classifying Windows malware using Space-Filling Curves (SFCs). The binary image was converted using SFC, and the images were trained using the KNN-HOG and GIST algorithms.…”
Section: A Image Visualizationmentioning
confidence: 99%
“…O'Shaughnessy [32] proposed a novel method for visualizing and classifying Windows malware using Space-Filling Curves (SFCs). The binary image was converted using SFC, and the images were trained using the KNN-HOG and GIST algorithms.…”
Section: A Image Visualizationmentioning
confidence: 99%
“…The malicious files contained known malware classes and the algorithm achieved an overall detection rate of 74% when trained with optimal parameters. Another study published by [41] paired binvis.io image generation with several machine learning models to perform classification of known malware families. The model accuracy achieved a score of 91% under the knearest neighbours (KNN) algorithm and outperformed the work published in 2011 by [42] when tested at previously unknown files.…”
Section: Research Related To Binvisiomentioning
confidence: 99%
“…These experiments were originally mentioned in Section 2. In their approach, the authors [40,41,43,44] used the BinVis algorithm to generate images which are used as input to the objective of feature classification. Their aim was to conduct either malware/benign filetype classification [40], malware family classification [41], or malware/benign IoT traffic classification [43,44].…”
Section: Comparison With Previous Applications Based On Binvismentioning
confidence: 99%
See 1 more Smart Citation
“…In their experiments, the input image was obtained by mapping the time series into a two-dimensional image for each sEMG channel, which is similar to our technique. SFCs were also used for malware classification and detection [12,13]. In their work the authors have mapped the code of the program, which can be viewed as a sequence of bytes, to pixels of an image.…”
Section: Introductionmentioning
confidence: 99%