malicious code detection
Recently Published Documents


TOTAL DOCUMENTS

85
(FIVE YEARS 26)

H-INDEX

9
(FIVE YEARS 2)

Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 119
Author(s):  
Seong-Kyu Kim

In this study, future cars are attempting self-driving around the world. However, hacking, such as ECUs in automobiles, creates problems that are directly connected to human life. Therefore, this study wrote a paper that detects anomalies in such cars by field. As a related study, the study investigated the vulnerabilities of the automobile security committee and automobile security standards and investigated the detection of abnormalities in the hacking of geo-train cars using artificial intelligence’s LSTM and blockchain consensus algorithm. In addition, in automobile security, an algorithm was studied to predict normal and abnormal values using LSTM-based anomaly detection techniques on the premise that automobile communication networks are largely divided into internal and external networks. In the methodology, LSTM’s pure propagation malicious code detection technique was used, and it worked with an artificial intelligence consensus algorithm to increase security. In addition, Unity ML conducted an experiment by constructing a virtual environment using the Beta version. The LSTM blockchain consensus node network was composed of 50,000 processes to compare performance. For the first time, 100 Grouped Tx, 500 Channels were tested for performance. For the first time, the malicious code detection rate of the existing system was verified. Accelerator, Multichannel, Sharding, Raiden, Plasma, and Trubit values were verified, and values of approximately 15,000 to 50,000 were obtained. In this paper, we studied to become a paper of great significance on hacking that threatens human life with the development of self-driving cars in the future.


2021 ◽  
Vol 2010 (1) ◽  
pp. 012165
Author(s):  
Wei Li ◽  
Chenyi Zhang ◽  
Jieying Zhou ◽  
Dan Wang ◽  
Nuannuan Li

電腦學刊 ◽  
2021 ◽  
Vol 32 (4) ◽  
pp. 225-238
Author(s):  
Zhiyuan Zhang Zhiyuan Zhang ◽  
Zhenjiang Zhang Zhiyuan Zhang ◽  
Bo Shen Zhenjiang Zhang


The malicious code detection is critical task for in the field of security. The malicious code detection can be possibly by using convolutional neural network (CNN).Themalicious code can be categorized in to different families. The malicious code identification helps to identify the affected malware on the system. Malicious code theft data from our system and it yields high security issues in real time. The neural network architecture classifies the malicious code based on the collected dataset. The dataset contains different families of malicious code. The malicious code detection can be done with the help of model created from CNN architecture


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Ruigang Liang ◽  
Ying Cao ◽  
Peiwei Hu ◽  
Kai Chen

AbstractDecompilation aims to analyze and transform low-level program language (PL) codes such as binary code or assembly code to obtain an equivalent high-level PL. Decompilation plays a vital role in the cyberspace security fields such as software vulnerability discovery and analysis, malicious code detection and analysis, and software engineering fields such as source code analysis, optimization, and cross-language cross-operating system migration. Unfortunately, the existing decompilers mainly rely on experts to write rules, which leads to bottlenecks such as low scalability, development difficulties, and long cycles. The generated high-level PL codes often violate the code writing specifications. Further, their readability is still relatively low. The problems mentioned above hinder the efficiency of advanced applications (e.g., vulnerability discovery) based on decompiled high-level PL codes.In this paper, we propose a decompilation approach based on the attention-based neural machine translation (NMT) mechanism, which converts low-level PL into high-level PL while acquiring legibility and keeping functionally similar. To compensate for the information asymmetry between the low-level and high-level PL, a translation method based on basic operations of low-level PL is designed. This method improves the generalization of the NMT model and captures the translation rules between PLs more accurately and efficiently. Besides, we implement a neural decompilation framework called Neutron. The evaluation of two practical applications shows that Neutron’s average program accuracy is 96.96%, which is better than the traditional NMT model.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Cengiz Acarturk ◽  
Melih Sirlanci ◽  
Pinar Gurkan Balikcioglu ◽  
Deniz Demirci ◽  
Nazenin Sahin ◽  
...  

IEEE Network ◽  
2021 ◽  
pp. 1-9
Author(s):  
Zhihua Cui ◽  
Yaru Zhao ◽  
Yang Cao ◽  
Xingjuan Cai ◽  
Wensheng Zhang ◽  
...  

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Xiang Li ◽  
Yuanping Nie ◽  
Zhi Wang ◽  
Xiaohui Kuang ◽  
Kefan Qiu ◽  
...  

For malware detection, current state-of-the-art research concentrates on machine learning techniques. Binary n -gram OpCode features are commonly used for malicious code identification and classification with high accuracy. Binary OpCode modification is much more difficult than modification of image pixels. Traditional adversarial perturbation methods could not be applied on OpCode directly. In this paper, we propose a bidirectional universal adversarial learning method for effective binary OpCode perturbation from both benign and malicious perspectives. Benign features are those OpCodes that represent benign behaviours, while malicious features are OpCodes for malicious behaviours. From a large dataset of benign and malicious binary applications, we select the most significant benign and malicious OpCode features based on the feature SHAP value in the trained machine learning model. We implement an OpCode modification method that insert benign OpCodes into executables as garbage codes without execution and modify malicious OpCodes by equivalent replacement preserving execution semantics. The experimental results show that the benign and malicious OpCode perturbation (BMOP) method could bypass malicious code detection models based on the SVM, XGBoost, and DNN algorithms.


Sign in / Sign up

Export Citation Format

Share Document