Ajou University repository

Massive IoT malware classification method using binary liftingoa mark
Citations

SCOPUS

1

Citation Export

DC Field Value Language
dc.contributor.authorJeong, Hae Seon-
dc.contributor.authorKwak, Jin-
dc.date.issued2022-01-01-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/32386-
dc.description.abstractOwing to the development of next-generation network and data processing technologies, massive Internet of Things (IoT) devices are becoming hyperconnected. As a result, Linux malware is being created to attack such hyperconnected networks by exploiting security threats in IoT devices. To determine the potential threats of such Linux malware and respond effectively, malware classification through an analysis of the executed code is required; however, a limitation exists in that each heterogeneous architecture must be analyzed separately. However, the binary codes of a heterogeneous architecture can be translated to a high-level intermediate representation (IR) of the same format using binary lifting and malicious behavior information can be identified because the functions and parameters of the assembly code are stored in the IR. Consequently, this study suggests a Linux malware classification method applicable to various architectures by converting Linux assembly codes into an IR using binary lifting and then learning the IR Sequence which reflects malicious behavior pattern using deep learning model for sequence learning.-
dc.description.sponsorshipFunding Statement: This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (No. 2021R1A2C2011391) and this work was supported by the BK21 FOUR program of the National Research Foundation of Korea funded by the Ministry of Education (NRF5199991514504).-
dc.language.isoeng-
dc.publisherTech Science Press-
dc.titleMassive IoT malware classification method using binary lifting-
dc.typeArticle-
dc.citation.endPage481-
dc.citation.startPage467-
dc.citation.titleIntelligent Automation and Soft Computing-
dc.citation.volume32-
dc.identifier.bibliographicCitationIntelligent Automation and Soft Computing, Vol.32, pp.467-481-
dc.identifier.doi10.32604/iasc.2022.021038-
dc.identifier.scopusid2-s2.0-85119482853-
dc.identifier.urlhttps://www.techscience.com/iasc/v32n1/45280/pdf-
dc.subject.keywordAssembly code-
dc.subject.keywordBinary lifting-
dc.subject.keywordLinux malware-
dc.subject.keywordMalware classification-
dc.description.isoatrue-
dc.subject.subareaSoftware-
dc.subject.subareaTheoretical Computer Science-
dc.subject.subareaComputational Theory and Mathematics-
dc.subject.subareaArtificial Intelligence-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.