Tensor Methods for Static Malware Analysis

Author/Creator ORCID

Date

2023-01-01

Department

Computer Science and Electrical Engineering

Program

Computer Science

Citation of Original Publication

Rights

This item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu
Access limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan through a local library, pending author/copyright holder's permission.
Access limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission.

Abstract

Tensor decomposition methods have been used in many fields to find latent factors among data. Recent developments have made automatic decomposition feasible and has shown practical use in a network intrusion context. This work explores how tensors can be used in wide scale static malware analysis to provide automatic useful context to human analysts, where other automatic tools usually rely on short and incomprehensible strings of raw bytes.