Cited 5 time in
Static Analysis for Malware Detection with Tensorflow and GPU
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeon, J. | - |
| dc.contributor.author | Kim, J. | - |
| dc.contributor.author | Jeon, S. | - |
| dc.contributor.author | Lee, S. | - |
| dc.contributor.author | Jeong, Y.-S. | - |
| dc.date.accessioned | 2023-04-27T19:40:51Z | - |
| dc.date.available | 2023-04-27T19:40:51Z | - |
| dc.date.issued | 2021 | - |
| dc.identifier.issn | 1876-1100 | - |
| dc.identifier.issn | 1876-1119 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/5575 | - |
| dc.description.abstract | With the advent of malware generation toolkits that automatically generate malware, anyone without a professional skill can easily generate malware. As a result, the number of new/modified malware samples is rapidly increasing. The malware generated in this way attacks vulnerabilities, such as PCs and mobile devices without security patch, causing damages involving malicious actions, such as personal information leakage, theft of authorized certificates, and cryptocurrency mining. To solve this problem, most security companies use the signature-based malware detection technique to detect malware, in which the signatures of known malware and files suspected to be malware are compared before detecting malware. However, the signature-based malware detection technique has a limitation in that it is not efficient for detecting new/modified malware which is generated rapidly. Recently, research is underway to utilize deep learning technology for detecting new/modified malware. In this study, we propose a SAT scheme that can detect not only known malware but also new/modified malware more quickly and accurately, thereby reducing malware-induced damages to PCs and mobile devices. The SAT scheme employs an open source library called Tensorflow in the GPU environment to learn malware signatures and then to statically analyze malware. © 2021, Springer Nature Singapore Pte Ltd. | - |
| dc.format.extent | 10 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | - |
| dc.title | Static Analysis for Malware Detection with Tensorflow and GPU | - |
| dc.type | Article | - |
| dc.publisher.location | 독일 | - |
| dc.identifier.doi | 10.1007/978-981-15-9343-7_76 | - |
| dc.identifier.scopusid | 2-s2.0-85101517135 | - |
| dc.identifier.bibliographicCitation | Lecture Notes in Electrical Engineering, v.715, pp 537 - 546 | - |
| dc.citation.title | Lecture Notes in Electrical Engineering | - |
| dc.citation.volume | 715 | - |
| dc.citation.startPage | 537 | - |
| dc.citation.endPage | 546 | - |
| dc.type.docType | Conference Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Malware analysis | - |
| dc.subject.keywordAuthor | Malware detection | - |
| dc.subject.keywordAuthor | Signature | - |
| dc.subject.keywordAuthor | Static analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
