2020
DOI: 10.1016/j.future.2019.09.025
|View full text |Cite
|
Sign up to set email alerts
|

Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(63 citation statements)
references
References 20 publications
0
62
0
1
Order By: Relevance
“…Authors of [35], [36] have analyzed and discussed static, dynamic, hybrid and machine learning-based methods, pros, and cons of using them and the limitations of current research works. Bin Zhang et.al [9] proposes a convolution neural network (CNN) based approaches to detect ransomware using static analysis. Hanqi Zhang et.al [10] proposes N-gram model using opcode sequence to detect ransomware using a static analysis approach to map ransomware into families.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Authors of [35], [36] have analyzed and discussed static, dynamic, hybrid and machine learning-based methods, pros, and cons of using them and the limitations of current research works. Bin Zhang et.al [9] proposes a convolution neural network (CNN) based approaches to detect ransomware using static analysis. Hanqi Zhang et.al [10] proposes N-gram model using opcode sequence to detect ransomware using a static analysis approach to map ransomware into families.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Static analysis approach analyzes [9], [10] the structure of ransomware from the source code and binary string, identifies execution paths and constructing the control flow graph (CFG), application program interface (API) calls and opcode sequences to extract significant feature space that can represent the ransomware families. In [9], [10], Bin Zhang, Wentao Xiao et.al used static analysis technique based on opcode sequence, N-gram opcode sequence and deep learning to detect ransomware. Static analysis [9], [10] has limitations that it requires an expensive manual process to build signatures of malware for supervised detection engine.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…During recent times, the use of Attention based mechanisms have started to come to the forefront. Significant work has gone into using different kinds of Attention networks for byte level information as well as converted image malware datasets [22]. In this paper, we explore the use of Residual Attention and compare it with the existing techniques of Texture analysis and CNN based architecture.…”
Section: Related Workmentioning
confidence: 99%
“…值得注意的是, 有些恶意样本可 能被加固, 因此其真实 DEX 文件被隐藏, apktool 无法正常进行反编译, 此类加固样本不在我们的数 据集范围中. 针对该类型样本现如今有一些专门进行脱壳分析的研究工作, 典型的有 PackerGrind [49] , DexHunter [50] , DroidUnpack [ (3) 为了解决上述两个问题, 我们首先基于字符串编辑距离 [52] 在字节码特征中, 最为常见的是将 k-gram 技术 [77] 应用到操作码序列上, 通过步长为 k 的滑动窗 口将操作码序列划分为以 k 个操作码为单位组成的特征, 从而提高特征的鲁棒性 [78,79] . 但是该类方 法随着 k 值的增大, 其特征个数呈指数型增长.…”
Section: 恶意软件数据集unclassified