Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm
IoT(Internet of things), for the most part, comprises of the various scope of Internet-associated gadgets and hubs. In the context of military and defence systems (called as IoBT) these gadgets could be personnel wearable battle outfits, tracking devices, cameras, clinical gadgets etc., The integrit...
Main Authors: | Panduri Bharathi, Vummenthala Madhurika, Jonnalagadda Spoorthi, Ashwini Garwandha, Nagamani Naruvadi, Akhila Amanagati |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2020-01-01
|
Series: | E3S Web of Conferences |
Online Access: | https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/44/e3sconf_icmed2020_01009.pdf |
Similar Items
-
Using Attention Mechanism and Visualization of Opcode Sequences for Android Malware Detection
by: Ying-Ching Chang, et al.
Published: (2019) -
Integrating Control Flow and Opcode in Android Malware Analysis
by: Yi-Chun Wang, et al.
Published: (2018) -
Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features
by: Jixin Zhang, et al.
Published: (2018-01-01) -
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
by: Weina Niu, et al.
Published: (2020-06-01) -
The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes
by: Domhnall Carlin, et al.
Published: (2017-01-01)