操作码
计算机科学
恶意软件
卷积神经网络
Android恶意软件
字节
可执行文件
Android(操作系统)
人工智能
移动设备
机器学习
模式识别(心理学)
操作系统
作者
Seung-Pil W. Coleman,Young-Sup Hwang
出处
期刊:Lecture notes in electrical engineering
日期:2021-01-01
卷期号:: 167-173
被引量:1
标识
DOI:10.1007/978-981-33-6385-4_16
摘要
Due to the popularity of the android platform, there is a growth in the number of devices and threats. For this reason, it is essential to build reliable tools that can detect malware android application packages (APK) on this platform. Creating effective models requires the use of rich features that are hard to generate. In this work, we extracted the Dalvik executable (.dex) byte-codes from APKs. Android application binaries are opcode sequences. Then, we trained one-dimensional convolutional Neural networks (CNN) using those sequential data. These one-dimensional CNNs detect local features and reduce the feature size. We went even farther to combine one-dimensional CNNs with a bi-directional long-short term memory network (LSTM) to detect malware. Experimental results show that our model, trained on a balanced number of samples, got an error rate of merely 5.4% on a dataset of 20,000.
科研通智能强力驱动
Strongly Powered by AbleSci AI