I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer

09/15/2019
by   Miles Q. Li, et al.
0

Malware imposes tremendous threats to computer users nowadays. Since signature-based malware detection methods are neither effective nor efficient to identify new malware, many machine learning-based methods have been proposed. A common disadvantage of existing machine learning methods is that they are not based on understanding the full semantic meaning of assembly code of an executable. They rather use short assembly code fragments, because assembly code is usually too long to be modelled in its entirety. Another disadvantage is that those methods either have inferior performance or bad interpretability. To overcome these challenges, we propose an Interpretable MAware Detector (I-MAD), which achieves state-of-the-art performance on static malware detection with excellent interpretability. It integrates a hierarchical Transformer network that can understand assembly code at the basic block, function, and executable level. It also integrates our novel interpretable feed-forward neural network to provide interpretations for its detection results, by pointing out the impact of each feature with respect to the prediction. Experiment results show that our model significantly outperforms previous static malware detection models and presents meaningful interpretations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/13/2021

Towards Interpretable Ensemble Learning for Image-based Malware Detection

Deep learning (DL) models for image-based malware detection have exhibit...
research
01/27/2020

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis

In cyberattack detection and prevention systems, cybersecurity analysts ...
research
01/15/2021

Towards interpreting ML-based automated malware detection models: a survey

Malware is being increasingly threatening and malware detectors based on...
research
01/22/2021

A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion

In recent years, malware becomes more threatening. Concerning the increa...
research
11/28/2021

MALIGN: Adversarially Robust Malware Family Detection using Sequence Alignment

We propose MALIGN, a novel malware family detection approach inspired by...
research
12/16/2022

WebAssembly Diversification for Malware Evasion

WebAssembly is a binary format that has become an essential component of...
research
10/25/2017

Malware Detection by Eating a Whole EXE

In this work we introduce malware detection from raw byte sequences as a...

Please sign up or login with your details

Forgot password? Click here to reset