Detailed Information

Cited 0 time in webofscience Cited 4 time in scopus
Metadata Downloads

Directional Graph Transformer-Based Control Flow Embedding for Malware Classification

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Hyung-Jun-
dc.contributor.authorBu, Seok-Jun-
dc.contributor.authorCho, Sung-Bae-
dc.date.accessioned2024-12-03T02:01:02Z-
dc.date.available2024-12-03T02:01:02Z-
dc.date.issued2021-11-
dc.identifier.issn0302-9743-
dc.identifier.issn1611-3349-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/73674-
dc.description.abstractConsidering the fatality of malware attacks, the data-driven approach using massive malware observations has been verified. Deep learning-based approaches to learn the unified features by exploiting the local and sequential nature of control flow graph achieved the best performance. However, only considering local and sequential information from graph-based malware representation is not enough to model the semantics, such as structural and functional nature of malware. In this paper, functional nature are combined to the control flow graph by adding opcodes, and structural nature is embedded through DeepWalk algorithm. Subsequently, we propose the transformer-based malware control flow embedding to overcome the difficulty in modeling the long-term control flow and to selectively learn the code embeddings. Extensive experiments achieved performance improvement compared to the latest deep learning-based graph embedding methods, and in a 37.50% improvement in recall was confirmed for the Simda botnet attack. © 2021, Springer Nature Switzerland AG.-
dc.format.extent11-
dc.language영어-
dc.language.isoENG-
dc.publisherSpringer Verlag-
dc.titleDirectional Graph Transformer-Based Control Flow Embedding for Malware Classification-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1007/978-3-030-91608-4_42-
dc.identifier.scopusid2-s2.0-85126431246-
dc.identifier.bibliographicCitationLecture Notes in Computer Science, v.13113 LNCS, pp 426 - 436-
dc.citation.titleLecture Notes in Computer Science-
dc.citation.volume13113 LNCS-
dc.citation.startPage426-
dc.citation.endPage436-
dc.type.docTypeConference paper-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorAttention mechanism-
dc.subject.keywordAuthorControl flow graph-
dc.subject.keywordAuthorGraph embedding-
dc.subject.keywordAuthorMalware classification-
dc.subject.keywordAuthorTransformer encoder-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seok-Jun, Buu photo

Seok-Jun, Buu
IT공과대학 (컴퓨터공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE