Proceedings of the 8th International Symposium on Visualization for Cyber Security 2011
DOI: 10.1145/2016904.2016908
|View full text |Cite
|
Sign up to set email alerts
|

Malware images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
251
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 833 publications
(252 citation statements)
references
References 20 publications
1
251
0
Order By: Relevance
“…Finally, motivated by Ahmadi's work (Ahmadi et al, 2016), and with similarities to (Nataraj et al, 2011), Gibert (Gibert Llaurad o, 2016) applied a CNN to malware bytecode represented as two dimensional greyscale images. A similar down sampling approach as we employed was applied to normalize the size of each sample to 32 x 32 pixels.…”
Section: Features Extracted From Executed Codementioning
confidence: 99%
See 1 more Smart Citation
“…Finally, motivated by Ahmadi's work (Ahmadi et al, 2016), and with similarities to (Nataraj et al, 2011), Gibert (Gibert Llaurad o, 2016) applied a CNN to malware bytecode represented as two dimensional greyscale images. A similar down sampling approach as we employed was applied to normalize the size of each sample to 32 x 32 pixels.…”
Section: Features Extracted From Executed Codementioning
confidence: 99%
“…Overviews of the applications of AI to security and digital forensics are provided in (Franke and Srihari, 2008) and (Mitchell, 2014). A number of approaches have been implemented to aid digital forensic investigation through AI techniques (Mohammed et al, 2016;Rughani and Bhatt, 2017), automation (In de Braekt et al, 2016), and big data processing (Guarino, 2013).…”
Section: Introductionmentioning
confidence: 99%
“…Although works mentioned above [13], [14], [15], [16] and [17] are helpful to detect and classify new malware and their variants, still they have some limitations. For instance, on the one hand, global texture features lose local information needed for classification.…”
Section: Related Workmentioning
confidence: 99%
“…In [11] and [12], the authors used function based features for detecting and classifying malwares. Nataraj et al [13] used image processing techniques for visualizing malwares. They used K-nearest neighbor method with Euclidean distance for malware classification.…”
Section: Static Analysis Featuresmentioning
confidence: 99%