Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks.

Computers & Security(2023)

引用 2|浏览0
暂无评分
摘要
IoT malware analysis is crucial for understanding the behavior and purpose of malware samples. While deep learning methods have been applied to IoT malware analysis using sequences or graphs to represent system calls, these approaches have limitations in their semantic representation of system call names. This paper presents ENIMANAL , a novel cross-architecture IoT malware analysis method based on graph neural networks. ENIMANAL leverages information from the Linux Programmer Manual to improve the se-mantic representation of dynamic system call information. By fusing semantic and structural information, ENIMANAL constructs a unique feature representation called an attributed system call graph (ASCG). We evaluated ENIMANAL on a dataset of 63k IoT malware samples with 9 CPU architectures and find that it outperforms comparison methods by up to 46% in macro precision and 38% in macro recall, achieving macro precision, macro recall and macro f1-score of over 98%. Furthermore, we verify the robustness of ENIMANAL against "zero-day" IoT malware.& COPY; 2023 Elsevier Ltd. All rights reserved.
更多
查看译文
关键词
IoT malware, Malware analysis, Malware classification, System call graph, Deep learning, Graph neural network
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要