loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Abhishek Joshi 1 ; Divyateja Pasupuleti 1 ; P. Nischith 1 ; Sarvesh Sutaone 1 ; Soumil Ray 1 ; Soumyadeep Dey 2 and Barsha Mitra 1

Affiliations: 1 Department of CSIS, BITS Pilani, Hyderabad Campus, Hyderabad, India ; 2 Microsoft, India

Keyword(s): Malware, Android Malware, IoT Malware, Transformer Models, Malware Classification.

Abstract: The massive demand for connected and smart applications and the growth of high-speed communication technologies like 5G have led to a surge in the use of Android and Internet-of-Things (IoT) devices. The popularity of such devices has resulted in a huge number of malware attacks and infections being inflicted upon these devices. Cyber criminals relentlessly target the Android and IoT devices by developing new strains of malware. To defend against these malware attacks, researchers have developed different types of malware detection and categorization techniques. In this paper, we investigate the applicability and effectiveness of different transformer-based models, which use self-attention to learn global dependencies and contextual information, for malware classification on two platforms: Android and IoT. We consider two types of inputs for malware analysis - images and sequences. For image-based analysis, we convert Android APKs and IoT traffic into images that reflect their struct ural and behavioral features. We compare various convolutional neural network (CNN) based models with and without transformer layers, and a pure transformer model that directly processes the images. For sequence-based analysis, we extract the API call sequences from Android APKs, and apply a transformer model to encode and classify them. We also explore the effect of pretraining and embedding initialization on the transformer models. Our experiments demonstrate the advantages and limitations of using transformer-based models for malware classification, and provide insights into the training strategies and challenges of these models. To the best of our knowledge, this is the first work that systematically explores and compares different transformer-based models for malware classification on both image and sequence inputs. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.219.15.112

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Joshi, A.; Pasupuleti, D.; Nischith, P.; Sutaone, S.; Ray, S.; Dey, S. and Mitra, B. (2024). Malware Analysis Using Transformer Based Models: An Empirical Study. In Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-709-2; ISSN 2184-7711, SciTePress, pages 858-865. DOI: 10.5220/0012855100003767

@conference{secrypt24,
author={Abhishek Joshi. and Divyateja Pasupuleti. and P. Nischith. and Sarvesh Sutaone. and Soumil Ray. and Soumyadeep Dey. and Barsha Mitra.},
title={Malware Analysis Using Transformer Based Models: An Empirical Study},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT},
year={2024},
pages={858-865},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012855100003767},
isbn={978-989-758-709-2},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT
TI - Malware Analysis Using Transformer Based Models: An Empirical Study
SN - 978-989-758-709-2
IS - 2184-7711
AU - Joshi, A.
AU - Pasupuleti, D.
AU - Nischith, P.
AU - Sutaone, S.
AU - Ray, S.
AU - Dey, S.
AU - Mitra, B.
PY - 2024
SP - 858
EP - 865
DO - 10.5220/0012855100003767
PB - SciTePress