عرض بسيط للتسجيلة

المؤلفKhan, Kaleem Nawaz
المؤلفUllah, Najeeb
المؤلفAli, Sikandar
المؤلفKhan, Muhammad Salman
المؤلفNauman, Mohammad
المؤلفGhani, Anwar
تاريخ الإتاحة2024-12-11T07:23:41Z
تاريخ النشر2022-01-01
اسم المنشورSecurity and Communication Networks
المعرّفhttp://dx.doi.org/10.1155/2022/3710968
الاقتباسKhan, K. N., Ullah, N., Ali, S., Khan, M. S., Nauman, M., & Ghani, A. (2022). Op2Vec: An Opcode Embedding Technique and Dataset Design for End‐to‐End Detection of Android Malware. Security and Communication Networks, 2022(1), 3710968.‏
الرقم المعياري الدولي للكتاب19390114
معرّف المصادر الموحدhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85131158219&origin=inward
معرّف المصادر الموحدhttp://hdl.handle.net/10576/61812
الملخصAndroid is one of the leading operating systems for smartphones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of securing the Android platform are somewhat successful. However, existing detection techniques have severe shortcomings, including the cumbersome process of feature engineering. Designing representative features require expert domain knowledge. There is a need for minimizing human experts' intervention by circumventing handcrafted feature engineering. Deep learning could be exploited by extracting deep features automatically. Previous work has shown that operational codes (opcodes) of executables provide key information to be used with deep learning models for the detection process of malicious applications. The only challenge is to feed opcodes information to deep learning models. Existing techniques use one-hot encoding to tackle the challenge. However, the one-hot encoding scheme has severe limitations. In this paper, we introduce (1) a novel technique for opcodes embedding, which we name Op2Vec, and (2) based on the learned Op2Vec, we have developed a dataset for end-to-end detection of Android malware. Introducing the end-to-end Android malware detection technique avoids expert-intensive handcrafted feature extraction and ensures automation. Some of the recent deep learning-based techniques showed significantly improved results when tested with the proposed approach and achieved an average detection accuracy of 97.47%, precision of 0.976, and F1 score of 0.979.
اللغةen
الناشرHindawi Limited
الموضوعTechnique
العنوانOp2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware
النوعArticle
رقم المجلد2022
dc.accessType Abstract Only


الملفات في هذه التسجيلة

Thumbnail

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة