Detailed Information

Cited 7 time in webofscience Cited 9 time in scopus
Metadata Downloads

Triplet-trained graph transformer with control flow graph for few-shot malware classification

Full metadata record
DC Field Value Language
dc.contributor.authorBu, Seok-Jun-
dc.contributor.authorCho, Sung-Bae-
dc.date.accessioned2024-12-03T02:01:01Z-
dc.date.available2024-12-03T02:01:01Z-
dc.date.issued2023-11-
dc.identifier.issn0020-0255-
dc.identifier.issn1872-6291-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/73644-
dc.description.abstractThe exponential proliferation of malware requires robust detection mechanisms for the security of global enterprises and national infrastructures. Conventional malware classification methods primarily depend on extensive datasets of curated malware samples, rendering them suboptimal for detecting novel strains exploiting contemporary vulnerabilities. In this paper, we reformulate malware detection as a few-shot learning task, and propose a new distance-based classification method that harnesses the innate functional attributes of malware to mitigate the dependency on sample volume. A disentangled representation of the malware's control flow graph is exploited, and a specialized transformer architecture is trained with a triplet-loss function, aiming to finetune the representation of malicious attributes. An attention mechanism of the transformer judiciously discerns functional signatures from intricate control flow graphs. Empirical evaluations on real-world malware datasets underscore the efficacy of the proposed method, achieving an outstanding recall rate of 83.37% with mere 2,000 training samples. As a result, our method outperforms the state-of-the-art methods with an accuracy of 99.45% and a recall of 97.89%.-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier BV-
dc.titleTriplet-trained graph transformer with control flow graph for few-shot malware classification-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1016/j.ins.2023.119598-
dc.identifier.scopusid2-s2.0-85170280051-
dc.identifier.wosid001077949700001-
dc.identifier.bibliographicCitationInformation Sciences, v.649-
dc.citation.titleInformation Sciences-
dc.citation.volume649-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordAuthorMalware classification-
dc.subject.keywordAuthorFew -shot learning-
dc.subject.keywordAuthorControl flow graph-
dc.subject.keywordAuthorTransformer network-
dc.subject.keywordAuthorTriplet network-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seok-Jun, Buu photo

Seok-Jun, Buu
IT공과대학 (컴퓨터공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE