Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
158 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Generative AI-Based Effective Malware Detection for Embedded Computing Systems (2404.02344v2)

Published 2 Apr 2024 in cs.CR and cs.CV

Abstract: One of the pivotal security threats for the embedded computing systems is malicious software a.k.a malware. With efficiency and efficacy, Machine Learning (ML) has been widely adopted for malware detection in recent times. Despite being efficient, the existing techniques require a tremendous number of benign and malware samples for training and modeling an efficient malware detector. Furthermore, such constraints limit the detection of emerging malware samples due to the lack of sufficient malware samples required for efficient training. To address such concerns, we introduce a code-aware data generation technique that generates multiple mutated samples of the limitedly seen malware by the devices. Loss minimization ensures that the generated samples closely mimic the limitedly seen malware and mitigate the impractical samples. Such developed malware is further incorporated into the training set to formulate the model that can efficiently detect the emerging malware despite having limited exposure. The experimental results demonstrates that the proposed technique achieves an accuracy of 90% in detecting limitedly seen malware, which is approximately 3x more than the accuracy attained by state-of-the-art techniques.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (39)
  1. T. Adiono, “Challenges and opportunities in designing internet of things,” 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering, 2014.
  2. O. Abbas and et al., “Big data issues and challenges,” 2016.
  3. J. Johnson, “Number of malware attacks per year 2020,” Aug 2021. [Online]. Available: https://www.statista.com/statistics/873097/malware-attacks-per-year-worldwide/
  4. “Malware statistics trends report: Av-test,” 2021. [Online]. Available: https://www.av-test.org/en/statistics/malware/
  5. M. S. Jalali and et al., “The internet of things promises new benefits and risks: A systematic analysis of adoption dynamics of iot products,” IEEE Security Privacy, 2019.
  6. A. Damodaran et al., “A comparison of static, dynamic, and hybrid analysis for malware detection,” Journal of Computer Virology and Hacking Techniques, 2015.
  7. Q. Wang, W. U. Hassan, D. Li, K. Jee, X. Yu, K. Zou, J. Rhee, Z. Chen, W. Cheng, C. A. Gunter, and et al., “You are what you do: Hunting stealthy malware via data provenance analysis,” Proceedings 2020 Network and Distributed System Security Symposium, 2020.
  8. A. Makandar and A. Patrot, “Malware class recognition using image processing techniques,” in Int. Conf. on Data Management, Analytics and Innovation (ICDMAI), 2017.
  9. K. Kancherla and et.al, “Image visualization based malware detection,” in Computational Intelligence in Cyber Security (CICS), 2013.
  10. I. You and et.al, “Malware obfuscation techniques: A brief survey,” in Int. Conf. on Broadband, Wireless Comp., Comm. and Applications, 2010.
  11. B. Bashari Rad and et.al, “Camouflage in malware: From encryption to metamorphism,” IJCSNS, 2012.
  12. A. Dhavlle, S. Shukla, S. Rafatirad, H. Homayoun, and S. M. Pudukotai Dinakarrao, “Hmd-hardener: Adversarially robust and efficient hardware-assisted runtime malware detection,” in 2021 Design, Automation and Test in Europe Conference and Exhibition (DATE), 2021.
  13. S. Shukla, G. Kolhe, S. M. P. D, and S. Rafatirad, “Microarchitectural events and image processing-based hybrid approach for robust malware detection: Work-in-progress,” in Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion, ser. CASES ’19.   New York, NY, USA: Association for Computing Machinery, 2019.
  14. S. Shukla, P. D. Sai Manoj, G. Kolhe, and S. Rafatirad, “On-device malware detection using performance-aware and robust collaborative learning,” in 2021 58th ACM/IEEE Design Automation Conference (DAC), 2021.
  15. S. Shukla, S. Rafatirad, H. Homayoun, and S. M. P. Dinakarrao, “Federated learning with heterogeneous models for on-device malware detection in iot networks,” in 2023 Design, Automation and Test in Europe Conference and Exhibition (DATE), 2023.
  16. S. Shukla and et.al, “On-device malware detection using performance-aware and robust collaborative learning,” in Design Automation Conference, 2021.
  17. S. Shukla, G. Kolhe, H. Homayoun, S. Rafatirad, and S. M. P D, “Rafel - robust and data-aware federated learning-inspired malware detection in internet-of-things (iot) networks,” in Proceedings of the Great Lakes Symposium on VLSI 2022, ser. GLSVLSI ’22.   New York, NY, USA: Association for Computing Machinery, 2022.
  18. S. Shukla, A. Dhavlle, S. M. P. D, H. Homayoun, and S. Rafatirad, “Iron-dome: Securing iot networked systems at runtime by network and device characteristics to confine malware epidemics,” in 2022 IEEE 40th International Conference on Computer Design (ICCD), 2022.
  19. S. Shukla, G. Kolhe, S. M. PD, and S. Rafatirad, “Rnn-based classifier to detect stealthy malware using localized features and complex symbolic sequence,” in 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), 2019.
  20. S. Shukla and P. D. Sai Manoj, “Bring it on: Kinetic energy harvesting to spark machine learning computations in iots,” in 2024 International Symposium on Quality Electronic Design (ISQED), 2024.
  21. S. Barve, S. Shukla, S. M. P. Dinakarrao, and R. Jha, “Adversarial attack mitigation approaches using rram-neuromorphic architectures,” in Proceedings of the 2021 on Great Lakes Symposium on VLSI, ser. GLSVLSI ’21.   New York, NY, USA: Association for Computing Machinery, 2021.
  22. S. Shukla, S. Kasarapu, R. Hasan, S. M. P. D, and H. Shen, “Ubol: User-behavior-aware one-shot learning for safe autonomous driving,” in 2022 Fifth International Conference on Connected and Autonomous Driving (MetroCAD), 2022.
  23. S. Kasarapu, S. Shukla, and S. M. Pudukotai Dinakarrao, “Resource- and workload-aware model parallelism-inspired novel malware detection for iot devices,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023.
  24. S. J. Stolfo and et.al, “Towards stealthy malware detection,” in Malware Detection, 2007.
  25. A. Moser and et.al, “Limits of static analysis for malware detection,” in Annual Computer Security Applications Conference (ACSAC 2007), 2007.
  26. C. Rossow and et.al, “Prudent practices for designing malware experiments: Status quo and outlook,” Symposium on Security and Privacy, 2012.
  27. L. Nataraj and et al., “Malware images: Visualization and automatic classification,” in Int. Symposium on Visualization for Cyber Security, 2011.
  28. D. Gibert and et.al, “Using convolutional neural networks for classification of malware represented as images,” Journal of Computer Virology and Hacking Techniques, 2019.
  29. S. Kasarapu, R. Hassan, S. Rafatirad, H. Homayoun, and S. M. P. Dinakarrao, “Demography-aware covid-19 confinement with game theory,” in 2021 IEEE 3rd International Conference on Artificial Intelligence Circuits and Systems (AICAS).   IEEE, 2021, pp. 1–4.
  30. S. Kasarapu, R. Hassan, H. Homayoun, and S. M. Pudukotai Dinakarrao, “Scalable and demography-agnostic confinement strategies for covid-19 pandemic with game theory and graph algorithms,” COVID, vol. 2, no. 6, pp. 767–792, 2022.
  31. “Virustotal package,” 2021. [Online]. Available: https://www.rdocumentation.org/packages/virustotal/versions/0.2.1
  32. M. Basnet and et.al, “Ransomware detection using deep learning in the scada system of electric vehicle charging station,” in PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), 2021.
  33. S. Yue, “Imbalanced malware images classification: a cnn based approach,” arXiv preprint arXiv:1708.08042, 2017.
  34. L. Chen, “Deep transfer learning for static malware classification,” arXiv preprint arXiv:1812.07606, 2018.
  35. W. W. Lo and et.al, “An xception convolutional neural network for malware classification with transfer learning,” in Int. Conf. on New Technologies, Mobility and Security (NTMS), 2019.
  36. “A few-shot meta-learning based siamese neural network using entropy features for ransomware classification,” Computers and Security, vol. 117, p. 102691, 2022.
  37. S. Shukla and et.al, “Stealthy malware detection using rnn-based automated localized feature extraction and classifier,” in International Conference on Tools with Artificial Intelligence (ICTAI), 2019.
  38. D. Vasan and et.al, “Imcfn: Image-based malware classification using fine-tuned convolutional neural network architecture,” Feb 2020.
  39. N. Kumar and et.al, “Malware classification using early stage behavioral analysis,” in Asia Joint Conference on Information Security (AsiaJCIS), 2019.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com