Malware Detection by Eating a Whole EXE
dc.contributor.author | Raff, Edward | |
dc.contributor.author | Barker, Jon | |
dc.contributor.author | Sylvester, Jared | |
dc.contributor.author | Brandon, Robert | |
dc.contributor.author | Catanzaro, Bryan | |
dc.contributor.author | Nicholas, Charles | |
dc.date.accessioned | 2019-02-06T15:38:08Z | |
dc.date.available | 2019-02-06T15:38:08Z | |
dc.description | The Workshops of the Thirty-Second AAAI Conference on Artificial Intelligence | |
dc.description.abstract | In this work we introduce malware detection from raw byte sequences as a fruitful research area to the larger machine learning community. Building a neural network for such a problem presents a number of interesting challenges that have not occurred in tasks such as image processing or NLP. In particular, we note that detection from raw bytes presents a sequence problem with over two million time steps and a problem where batch normalization appear to hinder the learning process. We present our initial work in building a solution to tackle this problem, which has linear complexity dependence on the sequence length, and allows for interpretable sub-regions of the binary to be identified. In doing so we will discuss the many challenges in building a neural network to process data at this scale, and the methods we used to work around them. | en_US |
dc.description.uri | https://aaai.org/ocs/index.php/WS/AAAIW18/paper/viewFile/16422/15577 | en_US |
dc.format.extent | 9 pages | en_US |
dc.genre | conference papers and proceedings | en_US |
dc.identifier | doi:10.13016/m2rt7w-bkok | |
dc.identifier.citation | Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles Nicholas, Malware Detection by Eating a Whole EXE, The Workshops of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018,https://aaai.org/ocs/index.php/WS/AAAIW18/paper/viewFile/16422/15577 | en_US |
dc.identifier.uri | http://hdl.handle.net/11603/12714 | |
dc.language.iso | en_US | en_US |
dc.publisher | AAAI | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.subject | malware detection | en_US |
dc.subject | image processing | en_US |
dc.subject | virtual machine | en_US |
dc.title | Malware Detection by Eating a Whole EXE | en_US |
dc.type | Text | en_US |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 2.56 KB
- Format:
- Item-specific license agreed upon to submission
- Description: