Dynamic Malware Analysis with Feature Engineering and Feature Learning

07/17/2019
by   Zhaoqi Zhang, et al.
0

Dynamic malware analysis executes the program in an isolated environment and monitors its run-time behaviour (e.g., system API calls) for malware detection. This technique has been proven to be effective against various code obfuscation techniques and newly released ("zero-day") malware. However, existing works typically only consider the API name while ignoring the arguments, or require complex feature engineering operations and expert knowledge to process the arguments. In this paper, we propose a novel and low-cost feature extraction approach, and an effective deep neural network architecture for accurate and fast malware detection. Specifically, the feature representation approach utilizes a feature hashing trick to encode the API call arguments associated with the API name. The deep neural network architecture applies multiple Gated-CNNs (convolutional neural networks) to transform the extracted features of each API call. The outputs are further processed through LSTM (long-short term memory networks) to learn the sequential correlation among API calls. Experiments show that our solution outperforms baselines significantly on a large real dataset. Valuable insights about feature engineering and architecture design are derived from ablation study.

READ FULL TEXT
research
02/13/2018

Towards Generic Deobfuscation of Windows API Calls

A common way to get insight into a malicious program's functionality is ...
research
09/08/2022

MalDetConv: Automated Behaviour-based Malware Detection Framework Based on Natural Language Processing and Deep Learning Techniques

The popularity of Windows attracts the attention of hackers/cyber-attack...
research
02/10/2020

Feature-level Malware Obfuscation in Deep Learning

We consider the problem of detecting malware with deep learning models, ...
research
10/01/2019

Ransomware Analysis using Feature Engineering and Deep Neural Networks

Detection and Analysis of a potential malware specifically, used for ran...
research
12/16/2019

Learning Malware Representation based on Execution Sequences

Malware analysis has been extensively investigated as the number and typ...
research
05/08/2022

SeqNet: An Efficient Neural Network for Automatic Malware Detection

Malware continues to evolve rapidly, and more than 450,000 new samples a...
research
08/24/2019

Precise system-wide concatic malware unpacking

Run time packing is a common approach malware use to obfuscate their pay...

Please sign up or login with your details

Forgot password? Click here to reset