2018
DOI: 10.1007/978-3-030-00563-4_70
|View full text |Cite
|
Sign up to set email alerts
|

Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Another study [38] introduced a technique based on examining the opcodes of executable files obtained from VMs, particularly the VMs' RAM image, using VM introspection tools. After that, it classifies the files using classification models to determine which files are benign and which are malicious.…”
Section: Experimental Results and Evaluationmentioning
confidence: 99%
“…Another study [38] introduced a technique based on examining the opcodes of executable files obtained from VMs, particularly the VMs' RAM image, using VM introspection tools. After that, it classifies the files using classification models to determine which files are benign and which are malicious.…”
Section: Experimental Results and Evaluationmentioning
confidence: 99%
“…The model accuracy was 92.5%. These three techniques of reducing the feature space size can be combined into one method, as proposed in [34]; the authors combined three approaches by using a small data set of 10,000 Android applications, extracted features from the op code only, and applied an information gain method to obtain the top k features.…”
Section: Feature Selection Methods Of Android Static Featuresmentioning
confidence: 99%