Oct. 19, 2022, 2:20 a.m. | John Musgrave, Temesguen Messay-Kebede, David Kapp, Anca Ralescu

cs.CR updates on arXiv.org arxiv.org

In this study we have presented a novel feature representation for malicious
programs that can be used for malware classification. We have shown how to
construct the features in a bottom-up approach, and analyzed the overlap of
malicious and benign programs in terms of their components. We have shown that
our method of analysis offers an increase in feature resolution that is
descriptive of data movement in comparison to tf-idf features.

classification malware malware classification representation

Principal Security Research Manager

@ Microsoft | Redmond, Washington, United States

SOC Manager

@ Inbox Business Technologies | Islamabad, Islamabad Capital Territory, Pakistan

Cybersecurity Incident Response Program Manager (Hybrid)

@ UMB Bank | MO - Kansas City - 1010 Grand Blvd

Consultant, Cyber Risk Advisory | Remote US

@ Coalfire | United States

Cybersecurity Bid Manager

@ Alstom | Derby, GB

Cyberspace Analyst

@ Peraton | Fort Meade, MD, United States