M. Santacroce, Wayne Stegner, Daniel J. Koranek, R. Jha
{"title":"基于神经网络显著性的可执行代码恶意特征提取研究","authors":"M. Santacroce, Wayne Stegner, Daniel J. Koranek, R. Jha","doi":"10.1109/NAECON46414.2019.9057859","DOIUrl":null,"url":null,"abstract":"We have previously created successful neural networks for malware detection. Here, we examine a network with salience to extract parts of an input deemed important. We show that the blocks we extract are what is important to the network, are unique to their class, and show clear similarities when clustered.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Foray Into Extracting Malicious Features from Executable Code with Neural Network Salience\",\"authors\":\"M. Santacroce, Wayne Stegner, Daniel J. Koranek, R. Jha\",\"doi\":\"10.1109/NAECON46414.2019.9057859\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We have previously created successful neural networks for malware detection. Here, we examine a network with salience to extract parts of an input deemed important. We show that the blocks we extract are what is important to the network, are unique to their class, and show clear similarities when clustered.\",\"PeriodicalId\":193529,\"journal\":{\"name\":\"2019 IEEE National Aerospace and Electronics Conference (NAECON)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE National Aerospace and Electronics Conference (NAECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON46414.2019.9057859\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON46414.2019.9057859","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Foray Into Extracting Malicious Features from Executable Code with Neural Network Salience
We have previously created successful neural networks for malware detection. Here, we examine a network with salience to extract parts of an input deemed important. We show that the blocks we extract are what is important to the network, are unique to their class, and show clear similarities when clustered.