4.6 Article

Malytics: A Malware Detection Scheme

Journal

IEEE ACCESS
Volume 6, Issue -, Pages 49418-49431

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2864871

Keywords

Malware detection; static analysis; binary level n-grams; term frequency shimhashing; extreme learning machine

Ask authors/readers for more resources

An important problem of cyber-security is malware analysis. Besides good precision and recognition rate, ideally, a malware detection scheme needs to be able to generalize well for novel malware families (a.k.a zero-day attacks). It is important that the system does not require excessive computation particularly for deployment on the mobile devices. In this paper, we propose a novel scheme to detect malware which we call Malytics. It is not dependent on any particular tool or operating system. It extracts static features of any given binary file to distinguish malware from benign. Malytics consists of three stages: feature extraction, similarity measurement, and classification. The three phases are implemented by a neural network with two hidden layers and an output layer. We show feature extraction, which is performed by tf-simhashing, is equivalent to the first layer of a particular neural network. We evaluate Malytics performance on both Android and Windows platforms. Malytics outperforms a wide range of learning-based techniques and also individual state-of-the-art models on both platforms. We also show Malytics is resilient and robust in addressing zero-day malware samples. The F1-score of Malytics is 97.21% and 99.45% on Android dex file and Windows PE files, respectively, in the applied datasets. The speed and efficiency of Malytics are also evaluated.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

Online Characterization and Detection of False Data Injection Attacks in Wide-Area Monitoring Systems

Ahmed Musleh, Guo Chen, Zhao Yang Dong, Chen Wang, Shiping Chen

Summary: Two FDIA characterization algorithms based on PCA and CCA are developed in this paper, with testing results indicating promising performance in FDIA characterization utilizing both algorithms.

IEEE TRANSACTIONS ON POWER SYSTEMS (2022)

Article Computer Science, Information Systems

Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures

Vijay Varadharajan, Kallol Krishna Karmakar, Uday Tupakula, Michael Hitchens

Summary: This paper addresses the fundamental issue of trust in network slices and proposes a trust model and property-based trust attestation mechanisms. The model evaluates the trust of virtual network functions in the network slice and helps determine their trustworthiness and required properties. The proposed trust model and mechanisms enable service providers to determine the trustworthiness of network services and users to develop trustworthy applications.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Computer Science, Information Systems

Blockchain Enables Your Bill Safer

Qin Wang, Longxia Huang, Shiping Chen, Yang Xiang

Summary: In this article, a framework called pAuditChain is proposed to address the data auditing and privacy protection issues of smart meter bills using homomorphic encryption and blockchain technology. The framework not only accommodates individual consumption checking requests but also handles bulk auditing requests from governments. The proposed solution improves the security and privacy of bills without compromising the auditing function.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Theory & Methods

SoK: DAG-based Blockchain Systems

Qin Wang, Jiangshan Yu, Shiping Chen, Yang Xiang

Summary: Limitations in latency and scalability of classical blockchain systems hinder their adoption and application. Reconstructed blockchain systems using Directed Acyclic Graph (DAG) have been proposed to address these limitations and enable fast confirmation and high scalability. However, there is a need for systematic work that summarizes DAG techniques in this field. This Systematization of Knowledge (SoK) provides a comprehensive analysis of existing and ongoing DAG-based blockchain systems, evaluating them from various perspectives and discussing trade-offs, challenges, and future research directions.

ACM COMPUTING SURVEYS (2023)

Article Automation & Control Systems

Attack Detection in Automatic Generation Control Systems using LSTM-Based Stacked Autoencoders

Ahmed S. Musleh, Guo Chen, Zhao Yang Dong, Chen Wang, Shiping Chen

Summary: Automatic generation control is crucial for power grid stability, but its dependence on communication systems makes it vulnerable to cyberphysical attacks. This article proposes a novel spatio-temporal learning algorithm to address the issue of false data injection attacks by learning the normal dynamics and evaluating reconstruction residuals for improved security.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Electrical & Electronic

Spatio-temporal data-driven detection of false data injection attacks in power distribution systems

Ahmed S. Musleh, Guo Chen, Zhao Yang Dong, Chen Wang, Shiping Chen

Summary: The utilization of distributed generation units has increased the complexity of power distribution systems. To address this issue, a spatio-temporal learning algorithm is proposed to detect false data injection attacks by assessing the residual error of measurement samples. This data-driven method overcomes the nonlinearities and uncertainties of distribution systems.

INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS (2023)

Article Chemistry, Multidisciplinary

Transformer-Based Subject-Sensitive Hashing for Integrity Authentication of High-Resolution Remote Sensing (HRRS) Images

Kaimeng Ding, Shiping Chen, Yue Zeng, Yingying Wang, Xinyun Yan

Summary: The proposed Transformer-based subject-sensitive hashing algorithm in this paper can be applied to the data security of HRRS images by providing integrity authentication services and generating digital watermarks. It overcomes the shortcomings of existing authentication methods and achieves subject-sensitive authentication of HRRS images. The algorithm enhances robustness, especially against JPEG compression, compared to existing algorithms.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Cybernetics

Adapting New Learners and New Resources to Micro Open Learning via Online Computation

Geng Sun, Wei Wei, Tingru Cui, Dongming Xu, Shiping Chen, Alex Shvonski, Li Li, Jun Shen, Soheila Garshasbi

Summary: Since the outbreak of COVID-19, there has been a high demand for alternative methods of remote learning to keep students on track and prevent them from being exposed to the risk of infection. Education providers have been experimenting with delivering knowledge and learning materials remotely, combining learning management systems, open educational resources, mini applications in social media, and video-conference software to create multi-channel delivery modes. However, the lack of learner information and the continuous release of new resources have posed challenges in implementing innovative and adaptive micro learning. To address the data sparsity issue, an online computation method has been proposed, along with a lightweight learner-micro-OER profile and two algorithmic solutions to tackle the cold start problem for new users and new items.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)

Article Computer Science, Theory & Methods

Exploring Blockchains Interoperability: A Systematic Survey

Gang Wang, Qin Wang, Shiping Chen

Summary: This article comprehensively reviews the current progress of blockchain interoperability, explores the general principles and procedures of interoperable blockchain systems, compares state-of-the-art systems, and identifies critical challenges and potential research directions.

ACM COMPUTING SURVEYS (2023)

Article Engineering, Electrical & Electronic

VSP-Fuse: Multifocus Image Fusion Model Using the Knowledge Transferred From Visual Salience Priors

Zeyu Wang, Xiongfei Li, Shuang Yu, Haoran Duan, Xiaoli Zhang, Jizheng Zhang, Shiping Chen

Summary: Multifocus image fusion (MFIF) is an efficient way to improve the visual effect of images with partial focus defects, and it is of great significance in the field of image enhancement. In this study, an edge-sensitive model for MFIF is presented, taking into account the correlation between salience object detection (SOD) and MFIF. Additionally, a randomized approach is proposed to generate massive training sets and pseudo-labels based on limited unlabeled data.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Computer Science, Software Engineering

Modeling and exploring the evolution of the mobile software ecosystem: How far are we?

Jianmao Xiao, Zhipeng Xu, Donghua Zhang, Shiping Chen, Chenyu Liu, Zhiyong Feng, Guodong Fan, Chuying Ouyang

Summary: This paper proposes a research framework based on community mining to investigate the evolution process and influencing factors of mobile software ecosystems. By analyzing evolution events and crucial factors in different periods, the healthy operation of mobile software ecosystems can be maintained and improved.

JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS (2023)

Article Computer Science, Hardware & Architecture

Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling

Shoulu Hou, Wei Ni, Kailan Zhao, Bo Cheng, Shuai Zhao, Zhiguo Wan, Xiulei Liu, Shiping Chen

Summary: This article presents a decentralized, three-timescale, online optimization approach that can significantly improve the energy efficiency of multicore micro data centers.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2023)

Proceedings Paper Computer Science, Software Engineering

Towards better ML-based software services: an investigation of source code engineering impact

Yanli Li, Chongbin Ye, Huaming Chen, Shiping Chen, Minhui Xue, Jun Shen

Summary: In recent years, there has been rapid development in machine learning-based software service solutions, specifically for source code. However, the impact of source code engineering on these models is often overlooked. This study evaluates different parsing tools for their impact on a Code2Vec model's prediction task for method names in Java language. The results show that ASTs generated by different parsing tools vary significantly in terms of source code structures and contents, which can significantly affect the model's performance. Therefore, the selection of appropriate parsing tools during data pre-processing is crucial for machine learning models implemented in software services.

2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SERVICES ENGINEERING, SSE (2023)

Proceedings Paper Engineering, Electrical & Electronic

ISAR Ship Classification Using Transfer Learning

Weiliang Zhao, Anthony Heng, Luke Rosenberg, Si Tran Nguyen, Len Hamey, Mehmet Orgun

Summary: Inverse synthetic aperture radar (ISAR) is increasingly used in airborne maritime radar for noncooperative target imaging and classification. Traditional classification methods are limited by their reliance on geometric features extracted from images of known targets, which hampers their ability to classify unknown vessels. To address this challenge, this study proposes a transfer learning approach combined with an output layer called OpenMax. By comparing the new classification results with traditional methods and a three-layer Convolutional Neural Network (CNN) using a dataset of small vessels, it is observed that the use of OpenMax significantly improves classification performance for vessels from unknown classes.

2022 IEEE RADAR CONFERENCE (RADARCONF'22) (2022)

Review Chemistry, Physical

How Can We Provide Additively Manufactured Parts with a Fingerprint? A Review of Tagging Strategies in Additive Manufacturing

Antonella Sola, Yilin Sai, Adrian Trinchi, Clement Chu, Shirley Shen, Shiping Chen

Summary: Additive manufacturing (AM) is evolving towards industrial production, providing customized components for aerospace, defense, and biomedicine. Adding a tagging feature to AM parts is important for logistics, certification, and anti-counterfeiting. Materials engineers are researching the preferred tag types for different objects and how to modify existing materials and 3D printing hardware to create such tags.

MATERIALS (2022)

No Data Available