2016
DOI: 10.1007/978-3-319-45871-7_15
|View full text |Cite
|
Sign up to set email alerts
|

SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…They implement the solution using Tensorflow [148] and Theano [160]. Malware samples are collected using malware zoo [178] from three primary sources: Virus Share [133], Maltrieve [134] and proprietary collections. They obtain the labels for training the network from VirusTotal [135].…”
Section: ) Api Call Solutionsmentioning
confidence: 99%
“…They implement the solution using Tensorflow [148] and Theano [160]. Malware samples are collected using malware zoo [178] from three primary sources: Virus Share [133], Maltrieve [134] and proprietary collections. They obtain the labels for training the network from VirusTotal [135].…”
Section: ) Api Call Solutionsmentioning
confidence: 99%
“…We collect malware samples and track the behavior of malware using Cuckoo malware analysis [24]. The malware collection consists of samples collected from two primary sources: Virus Share [25] and GitHub / TheZoo [26]. We chose this source because it provided a large and varied sample Portable Executable (PE) file for evaluation.…”
Section: Dataset Generationmentioning
confidence: 99%
“…We use a published framework [15] to collect samples. Our dataset is consisted of files collected from 3 major sources: Virus Share [16], Maltrieve [17] and private collections.…”
Section: Datasetmentioning
confidence: 99%