2021
DOI: 10.1016/j.cose.2021.102420
|View full text |Cite
|
Sign up to set email alerts
|

Image-based malware classification using section distribution information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 15 publications
0
28
0
Order By: Relevance
“…100 MB correspond to a sequence of 100,000,000 bytes. To deal with these sequences of extreme length, various approaches [14,10,11,13,12,21,22,23,24] proposed to compress the information in the malware's binary content. For instance, Gibert et al [10] presented an approach to classify malware represented as a stream of entropy values.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…100 MB correspond to a sequence of 100,000,000 bytes. To deal with these sequences of extreme length, various approaches [14,10,11,13,12,21,22,23,24] proposed to compress the information in the malware's binary content. For instance, Gibert et al [10] presented an approach to classify malware represented as a stream of entropy values.…”
Section: Related Workmentioning
confidence: 99%
“…In their work, the binary content is divided into chunks of code of fixed size and afterwards, the information at each chunk is compressed by calculating its entropy value. On the other hand, executables could be represented as grayscale images [11,12,23,24]. To represent a malware sample as a grayscale image, every byte has to be interpreted as one pixel in an image, where values are in the [0,255] (0:black, 255:white).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Grayscale images are straightforward to generate from executable files-we simply interpret the bytes as pixels in an image. This is the most popular approach in the research literature for generating malware images; see, for example [24,33,52]. Only the byte sequence of the executable file is needed, and the processing is fast, even if resizing is employed.…”
Section: Grayscale Imagesmentioning
confidence: 99%
“…On one hand, some subjectively setting machine codes are not discarded in original malware gray image, which destroys the similarity between the same family. On the other hand, due to the file alignment mechanism or other reasons, the section distribution boundary of gray image is not consistent with the actual section distribution boundary [6]. Gray image only has binary original data, it is difficult to identify the section distribution information, and the section distribution information is an important part of malware.…”
Section: Introductionmentioning
confidence: 99%