The increasing sophistication of malware variants such as encryption, polymorphism, and obfuscation calls for the new detection and classification technology. In this paper, MalDeep, a novel malware classification framework of deep learning based on texture visualization, is proposed against malicious variants. Through code mapping, texture partitioning, and texture extracting, we can study malware classification in a new feature space of image texture representation without decryption and disassembly. Furthermore, we built a malware classifier on convolutional neural network with two convolutional layers, two downsampling layers, and many full connection layers. We adopt the dataset, from Microsoft Malware Classification Challenge includin...
Malware texture pattern plays an essential role in defense against malicious instructions which were...
Despite the continuous updating of anti-detection systems for malicious programs (malware), malware ...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...
The number of malicious files detected every year are counted by millions. One of the main reasons f...
Recent technological developments in computer systems transfer human life from real to virtual envir...
In recent years, the research on malware variant classification has attracted much more attention. H...
The number of malicious files detected every year are counted by millions. One of the main reasons f...
Malware is intentionally designed to damage computers, servers, clients or computer networks. Malwa...
With the continuous development and popularization of the Internet, there has been an increasing num...
Malware detection plays a crucial role in computer security. Recent researches mainly use machine le...
Malware is intentionally designed to damage computers, servers, clients or computer networks. Malwar...
We propose a novel method to detect and visualize malware through image classification. The executab...
malware is malicious software (harmful program files) that targets and damage computers, devices, ne...
Despite the continuous updating of anti-detection systems for malicious programs (malware), malware ...
© 2020 IEEE. The Internet has resulted in cyber-threats and cyber-crimes, which can occur anywhere a...
Malware texture pattern plays an essential role in defense against malicious instructions which were...
Despite the continuous updating of anti-detection systems for malicious programs (malware), malware ...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...
The number of malicious files detected every year are counted by millions. One of the main reasons f...
Recent technological developments in computer systems transfer human life from real to virtual envir...
In recent years, the research on malware variant classification has attracted much more attention. H...
The number of malicious files detected every year are counted by millions. One of the main reasons f...
Malware is intentionally designed to damage computers, servers, clients or computer networks. Malwa...
With the continuous development and popularization of the Internet, there has been an increasing num...
Malware detection plays a crucial role in computer security. Recent researches mainly use machine le...
Malware is intentionally designed to damage computers, servers, clients or computer networks. Malwar...
We propose a novel method to detect and visualize malware through image classification. The executab...
malware is malicious software (harmful program files) that targets and damage computers, devices, ne...
Despite the continuous updating of anti-detection systems for malicious programs (malware), malware ...
© 2020 IEEE. The Internet has resulted in cyber-threats and cyber-crimes, which can occur anywhere a...
Malware texture pattern plays an essential role in defense against malicious instructions which were...
Despite the continuous updating of anti-detection systems for malicious programs (malware), malware ...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...