Ajou University repository

Platform-independent malware analysis applicable to windows and linux environmentsoa mark
  • Hwang, Chanwoong ;
  • Hwang, Junho ;
  • Kwak, Jin ;
  • Lee, Taejin
Citations

SCOPUS

18

Citation Export

DC Field Value Language
dc.contributor.authorHwang, Chanwoong-
dc.contributor.authorHwang, Junho-
dc.contributor.authorKwak, Jin-
dc.contributor.authorLee, Taejin-
dc.date.issued2020-05-01-
dc.identifier.issn2079-9292-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/31319-
dc.description.abstractMost cyberattacks use malicious codes, and according to AV-TEST, more than 1 billion malicious codes are expected to emerge in 2020. Although such malicious codes have been widely seen around the PC environment, they have been on the rise recently, focusing on IoT devices such as smartphones, refrigerators, irons, and various sensors. As is known, Linux/embedded environments support various architectures, so it is difficult to identify the architecture in which malware operates when analyzing malware. This paper proposes an AI-based malware analysis technology that is not affected by the operating system or architecture platform. The proposed technology works intuitively. It uses platform-independent binary data rather than features based on the structured format of the executable files. We analyzed the strings from binary data to classify malware. The experimental results achieved 94% accuracy on Windows and Linux datasets. Based on this, we expect the proposed technology to work effectively on other platforms and improve through continuous operation/verification.-
dc.description.sponsorshipFunding: This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2017R1E1A1A01075110).-
dc.language.isoeng-
dc.publisherMDPI AG-
dc.titlePlatform-independent malware analysis applicable to windows and linux environments-
dc.typeArticle-
dc.citation.titleElectronics (Switzerland)-
dc.citation.volume9-
dc.identifier.bibliographicCitationElectronics (Switzerland), Vol.9-
dc.identifier.doi10.3390/electronics9050793-
dc.identifier.scopusid2-s2.0-85085217536-
dc.identifier.urlhttps://www.mdpi.com/2079-9292/9/5/793/pdf-
dc.subject.keywordBinary analysis-
dc.subject.keywordDeep neural network-
dc.subject.keywordFeature importance-
dc.subject.keywordMalware analysis-
dc.subject.keywordStrings analysis-
dc.description.isoatrue-
dc.subject.subareaControl and Systems Engineering-
dc.subject.subareaSignal Processing-
dc.subject.subareaHardware and Architecture-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaElectrical and Electronic Engineering-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.