Abstract
In this paper, we propose a novel android malware detection system that uses a deep convolutional neural network (CNN). Malware classification is performed based on static analysis of the raw opcode sequence from a disassembled program. Features indicative of malware are automatically learned by the network from the raw opcode sequence thus removing the need for hand-engineered malware features. The training pipeline of our proposed system is much simpler than existing n-gram based malware detection methods,
as the network is trained end-to-end to jointly learn appropriate features and to perform classification, thus removing the need to explicitly enumerate millions of n-grams during training. The network design also allows the use of long n-gram like features, not computationally feasible with existing methods. Once trained, the network can be efficiently executed on a GPU, allowing a very large number of files to be scanned quickly.
as the network is trained end-to-end to jointly learn appropriate features and to perform classification, thus removing the need to explicitly enumerate millions of n-grams during training. The network design also allows the use of long n-gram like features, not computationally feasible with existing methods. Once trained, the network can be efficiently executed on a GPU, allowing a very large number of files to be scanned quickly.
Original language | English |
---|---|
Title of host publication | Proceedings of the ACM Conference on Data and Applications Security and Privacy (CODASPY) 2017 |
Publisher | Association for Computing Machinery |
Number of pages | 8 |
DOIs | |
Publication status | Published - 22 Mar 2017 |
Event | ACM Conference on Data and Applications Security and Privacy - Scottsdale, Arizona, United States Duration: 22 Mar 2017 → 24 Mar 2017 Conference number: 7th http://www.codaspy.org/ |
Conference
Conference | ACM Conference on Data and Applications Security and Privacy |
---|---|
Abbreviated title | CODASPY |
Country/Territory | United States |
City | Scottsdale, Arizona |
Period | 22/03/2017 → 24/03/2017 |
Internet address |