MC-ISA: A Multi-Channel Code Visualization Method for Malware Detection
-
Published:2023-05-17
Issue:10
Volume:12
Page:2272
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Qi Xuyan1, Liu Wei1, Lou Rui1, Li Qinghao1, Jiang Liehui1, Tang Yonghe1
Affiliation:
1. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
Abstract
Malware detection has always been a hot topic in the cyber security field. With continuous research over the years, many research methods and detection tools based on code visualization have been proposed and achieved good results. However, in the process of code visualization, the existing methods have some issues such as feature scarcity, feature loss and excessive dependence on manual analysis. To address these issues, we propose in this paper a code visualization method with multi-channel image size adaptation (MC-ISA) that can detect large-scale samples more quickly without manual reverse analysis. Experimental results demonstrate that MC-ISA achieves both higher accuracy and F1-score than the existing B2M algorithm after introducing three mechanisms including image size adaptive, color enhancement and multi-channel enhancement.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference42 articles.
1. Perdisci, R., Dagon, D., Lee, W., Fogla, P., and Sharif, M.I. (2006, January 21–24). Misleading worm signature generators using deliberate noise injection. Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06), Berkeley/Oakland, CA, USA. 2. Brumley, D., Newsome, J., Song, D.X., Wang, H., and Jha, S. (2006, January 21–24). Towards automatic generation of vulnerability-based signatures. Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06), Berkeley/Oakland, CA, USA. 3. Feng, Y., Anand, S., Dillig, I., and Aiken, A. (2014, January 19–21). Apposcopy: Semantics-based detection of Android malware through static analysis. Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, Hong Kong, China. 4. Christodorescu, M., Jha, S., Seshia, S.A., Song, D.X., and Bryant, R.E. (2005, January 8–11). Semantics-aware malware detection. Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P’05), Oakland, CA, USA. 5. Combined heuristics for determining order quantity under time-varying demands;Jun;J. Syst. Eng. Electron.,2008
|
|