Malware Classification

41 papers with code • 2 benchmarks • 5 datasets

Malware Classification is the process of assigning a malware sample to a specific malware family. Malware within a family shares similar properties that can be used to create signatures for detection and classification. Signatures can be categorized as static or dynamic based on how they are extracted. A static signature can be based on a byte-code sequence, binary assembly instruction, or an imported Dynamic Link Library (DLL). Dynamic signatures can be based on file system activities, terminal commands, network communications, or function and system call sequences.

Source: Behavioral Malware Classification using Convolutional Recurrent Neural Networks

Latest papers with no code

Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications

no code yet • 26 Mar 2024

The success of Large Language Models (LLMs) has led to a parallel rise in the development of Large Multimodal Models (LMMs), such as Gemini-pro, which have begun to transform a variety of applications.

Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection

no code yet • 23 Mar 2024

Malware detection is an interesting and valuable domain to work in because it has significant real-world impact and unique machine-learning challenges.

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

no code yet • 2 Feb 2024

Machine learning (ML) plays a pivotal role in detecting malicious software.

A Malware Classification Survey on Adversarial Attacks and Defences

no code yet • 15 Dec 2023

This survey study offers an in-depth look at current research in adversarial attack and defensive strategies for malware classification in cybersecurity.

Enhancing Efficiency and Privacy in Memory-Based Malware Classification through Feature Selection

no code yet • 30 Sep 2023

Results demonstrate that the feature selection strategy, incorporating mutual information and other methods, enhances classifier performance for all tasks.

Malware Classification using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices

no code yet • 21 Aug 2023

With the increasing extent of malware attacks in the present day along with the difficulty in detecting modern malware, it is necessary to evaluate the effectiveness and performance of Deep Neural Networks (DNNs) for malware classification.

Impact of Feature Encoding on Malware Classification Explainability

no code yet • 10 Jul 2023

Using a malware classification dataset, we trained an XGBoost model and compared the performance of two feature encoding methods: Label Encoding (LE) and One Hot Encoding (OHE).

A Natural Language Processing Approach to Malware Classification

no code yet • 7 Jul 2023

Many different machine learning and deep learning techniques have been successfully employed for malware detection and classification.

Steganographic Capacity of Deep Learning Models

no code yet • 25 Jun 2023

We find that the steganographic capacity of the learning models tested is surprisingly high, and that in each case, there is a clear threshold after which model performance rapidly degrades.

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features

no code yet • 1 Jun 2023

PROVEXPLAINER allowed simple DT models to achieve 95% fidelity to the GNN on program classification tasks with general graph structural features, and 99% fidelity on malware detection tasks with a task-specific feature package tailored for direct interpretation.