Malicious Code Detection: Run Trace Output Analysis by LSTM

01/14/2021
by   Cengiz Acarturk, et al.
18

Malicious software threats and their detection have been gaining importance as a subdomain of information security due to the expansion of ICT applications in daily settings. A major challenge in designing and developing anti-malware systems is the coverage of the detection, particularly the development of dynamic analysis methods that can detect polymorphic and metamorphic malware efficiently. In the present study, we propose a methodological framework for detecting malicious code by analyzing run trace outputs by Long Short-Term Memory (LSTM). We developed models of run traces of malicious and benign Portable Executable (PE) files. We created our dataset from run trace outputs obtained from dynamic analysis of PE files. The obtained dataset was in the instruction format as a sequence and was called Instruction as a Sequence Model (ISM). By splitting the first dataset into basic blocks, we obtained the second one called Basic Block as a Sequence Model (BSM). The experiments showed that the ISM achieved an accuracy of 87.51 while BSM achieved an accuracy of 99.26

READ FULL TEXT

page 2

page 3

page 4

page 5

page 7

page 8

page 9

page 10

research
06/28/2018

Robust Neural Malware Detection Models for Emulation Sequence Learning

Malicious software, or malware, presents a continuously evolving challen...
research
02/10/2020

Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning

Android malware detection is a critical step towards building a security...
research
07/27/2021

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

In the recent years, Portable Document Format, commonly known as PDF, ha...
research
12/01/2020

Game Theoretic Malware Detection

Large software platforms (e.g., mobile app stores, social media, email s...
research
08/26/2020

SIGL: Securing Software Installations Through Deep Graph Learning

Many users implicitly assume that software can only be exploited after i...
research
05/16/2020

Automatic Dialogic Instruction Detection for K-12 Online One-on-one Classes

Online one-on-one class is created for highly interactive and immersive ...
research
04/08/2021

Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs

The smart features of modern cars are enabled by a number of Electronic ...

Please sign up or login with your details

Forgot password? Click here to reset