Classification Computer architecture Malware analysis Object code a b s t r a c t Recent research has repeatedly shown that machine learning techniques can be applied to either whole files or file fragments to classify them for analysis. We build upon these techniques to show that for samples of un-labeled compiled computer object code, one can apply the same type of analysis to classify important aspects of the code, such as its target architecture and endianess. We show that using simple byte-value histograms we retain enough information about the opcodes within a sample to classify the target architecture with high accuracy, and then discuss heuristic-based features that exploit information within the operands to determine endianess. We ...
Commercially available antivirus software relies on a traditional malware detection technique known ...
Performing large-scale malware classification is increasingly becoming a critical step in malware an...
This thesis looks into automatic detection of security related code in order to eliminate this probl...
AbstractRecent research has repeatedly shown that machine learning techniques can be applied to eith...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
This thesis explores how architecture and endianness of executable code can be identified using bina...
This project aims to present the functionality and accuracy of five different machine learning algor...
Research in the field of malware classification often relies on machine learning models that are tra...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
Malware or malicious software is one of the major threats in the internet today and there are thousa...
Ransomware attacks increased in recent years causing significant damages and disruptions to business...
Based on the latest statistics, we can see a significant increase in the amount of malware on the ma...
International audienceCategorization of modern malware samples on the basis of their behavior has be...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Abstract. The recent growth in network usage has motivated the creation of new malicious code for va...
Commercially available antivirus software relies on a traditional malware detection technique known ...
Performing large-scale malware classification is increasingly becoming a critical step in malware an...
This thesis looks into automatic detection of security related code in order to eliminate this probl...
AbstractRecent research has repeatedly shown that machine learning techniques can be applied to eith...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
This thesis explores how architecture and endianness of executable code can be identified using bina...
This project aims to present the functionality and accuracy of five different machine learning algor...
Research in the field of malware classification often relies on machine learning models that are tra...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
Malware or malicious software is one of the major threats in the internet today and there are thousa...
Ransomware attacks increased in recent years causing significant damages and disruptions to business...
Based on the latest statistics, we can see a significant increase in the amount of malware on the ma...
International audienceCategorization of modern malware samples on the basis of their behavior has be...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Abstract. The recent growth in network usage has motivated the creation of new malicious code for va...
Commercially available antivirus software relies on a traditional malware detection technique known ...
Performing large-scale malware classification is increasingly becoming a critical step in malware an...
This thesis looks into automatic detection of security related code in order to eliminate this probl...