Cited 4 time in
Directional Graph Transformer-Based Control Flow Embedding for Malware Classification
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Moon, Hyung-Jun | - |
| dc.contributor.author | Bu, Seok-Jun | - |
| dc.contributor.author | Cho, Sung-Bae | - |
| dc.date.accessioned | 2024-12-03T02:01:02Z | - |
| dc.date.available | 2024-12-03T02:01:02Z | - |
| dc.date.issued | 2021-11 | - |
| dc.identifier.issn | 0302-9743 | - |
| dc.identifier.issn | 1611-3349 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/73674 | - |
| dc.description.abstract | Considering the fatality of malware attacks, the data-driven approach using massive malware observations has been verified. Deep learning-based approaches to learn the unified features by exploiting the local and sequential nature of control flow graph achieved the best performance. However, only considering local and sequential information from graph-based malware representation is not enough to model the semantics, such as structural and functional nature of malware. In this paper, functional nature are combined to the control flow graph by adding opcodes, and structural nature is embedded through DeepWalk algorithm. Subsequently, we propose the transformer-based malware control flow embedding to overcome the difficulty in modeling the long-term control flow and to selectively learn the code embeddings. Extensive experiments achieved performance improvement compared to the latest deep learning-based graph embedding methods, and in a 37.50% improvement in recall was confirmed for the Simda botnet attack. © 2021, Springer Nature Switzerland AG. | - |
| dc.format.extent | 11 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Verlag | - |
| dc.title | Directional Graph Transformer-Based Control Flow Embedding for Malware Classification | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1007/978-3-030-91608-4_42 | - |
| dc.identifier.scopusid | 2-s2.0-85126431246 | - |
| dc.identifier.bibliographicCitation | Lecture Notes in Computer Science, v.13113 LNCS, pp 426 - 436 | - |
| dc.citation.title | Lecture Notes in Computer Science | - |
| dc.citation.volume | 13113 LNCS | - |
| dc.citation.startPage | 426 | - |
| dc.citation.endPage | 436 | - |
| dc.type.docType | Conference paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Attention mechanism | - |
| dc.subject.keywordAuthor | Control flow graph | - |
| dc.subject.keywordAuthor | Graph embedding | - |
| dc.subject.keywordAuthor | Malware classification | - |
| dc.subject.keywordAuthor | Transformer encoder | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
