2021
DOI: 10.1016/j.future.2021.06.032
|View full text |Cite
|
Sign up to set email alerts
|

Visualization and deep-learning-based malware variant detection using OpCode-level features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…It takes advantage of visual converters that both mine long-range dependencies and compute in parallel, allowing it to outperform most other deep learning models for malware identification. Through comparison, it is easy to see that traditional machine learning algorithms have been difficult to achieve better results in the field of malicious image recognition, and the future research will focus more on the field of deep learning [20][21]25]. Our method also has some drawbacks, ViT itself has the disadvantage of being computationally intensive and relying on large-scale datasets.…”
Section: Comparison Of Results For Different Architecturesmentioning
confidence: 99%
“…It takes advantage of visual converters that both mine long-range dependencies and compute in parallel, allowing it to outperform most other deep learning models for malware identification. Through comparison, it is easy to see that traditional machine learning algorithms have been difficult to achieve better results in the field of malicious image recognition, and the future research will focus more on the field of deep learning [20][21]25]. Our method also has some drawbacks, ViT itself has the disadvantage of being computationally intensive and relying on large-scale datasets.…”
Section: Comparison Of Results For Different Architecturesmentioning
confidence: 99%
“…It should be noted that since different CPU architectures have different instruction sets, the opcodes are also different. Therefore, detecting malware samples across architectures requires considering the opcodes in each CPU architecture, leading to a computationally intensive process [ 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 ].…”
Section: Related Workmentioning
confidence: 99%
“…Darem et al [ 54 ] focused on the work of malware classification or identification by using the obfuscated malware opcodes present as ASM files that were converted into grayscale images during the processing stage. The images were generated based on the features extracted during the feature engineering stage.…”
Section: Introductionmentioning
confidence: 99%