Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

AN EFFECTIVE MALWARE CLASSIFICATION METHOD BASED ON BYTE-TO-IMAGE TRANSFORMATION AND INTEGRATION OF THE VISION TRANSFORMER MODEL

View through CrossRef
Malware classification is a critical problem in cybersecurity, characterized by numerous challenges due to the complexity and diversity of malware variants. In this study, we propose a novel approach that transforms bytecode into image representations and employs the Vision Transformer (ViT) architecture for malware family classification. The proposed data preprocessing method preserves essential structural information of the malware while simplifying feature extraction. ViT leverages the self-attention mechanism to model complex and long- range dependencies, offering advantages over traditional CNN-based models. Experiments conducted on the Microsoft Malware Classification Challenge dataset demonstrate that the proposed model achieves high accuracy and F1-scores, particularly for malware families such as Kelihos_ver3 and Lollipop. Confusion matrix analysis reveals a strong discriminative capability across malware families, while also highlighting challenges in distinguishing families with structurally similar or heavily obfuscated patterns. The study also discusses current limitations, including computational cost and the lack of integration of dynamic behavioral data, and outlines future research directions to improve performance and real-world applicability. Overall, the results highlight the potential of Vision Transformer architectures in malware classification, suggesting a promising avenue for further research in cybersecurity. Keywords: Malware classification; vision transformer (ViT); bytecode image representation; deep learning; self-attention.
Title: AN EFFECTIVE MALWARE CLASSIFICATION METHOD BASED ON BYTE-TO-IMAGE TRANSFORMATION AND INTEGRATION OF THE VISION TRANSFORMER MODEL
Description:
Malware classification is a critical problem in cybersecurity, characterized by numerous challenges due to the complexity and diversity of malware variants.
In this study, we propose a novel approach that transforms bytecode into image representations and employs the Vision Transformer (ViT) architecture for malware family classification.
The proposed data preprocessing method preserves essential structural information of the malware while simplifying feature extraction.
ViT leverages the self-attention mechanism to model complex and long- range dependencies, offering advantages over traditional CNN-based models.
Experiments conducted on the Microsoft Malware Classification Challenge dataset demonstrate that the proposed model achieves high accuracy and F1-scores, particularly for malware families such as Kelihos_ver3 and Lollipop.
Confusion matrix analysis reveals a strong discriminative capability across malware families, while also highlighting challenges in distinguishing families with structurally similar or heavily obfuscated patterns.
The study also discusses current limitations, including computational cost and the lack of integration of dynamic behavioral data, and outlines future research directions to improve performance and real-world applicability.
Overall, the results highlight the potential of Vision Transformer architectures in malware classification, suggesting a promising avenue for further research in cybersecurity.
Keywords: Malware classification; vision transformer (ViT); bytecode image representation; deep learning; self-attention.

Related Results

Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
The need to mitigate malware attacks cannot be overemphasized, as they pose serious threats to the critical information assets in cyberspace. Understanding and utilizing appropriat...
MCPDS: image-based malware classification method using PE metadata alone
MCPDS: image-based malware classification method using PE metadata alone
Abstract In response to the increasing threat posed by the exponential growth of malware in cybersecurity, researchers have developed a numbe...
Automatic Load Sharing of Transformer
Automatic Load Sharing of Transformer
Transformer plays a major role in the power system. It works 24 hours a day and provides power to the load. The transformer is excessive full, its windings are overheated which lea...
High frequency modeling of power transformers under transients
High frequency modeling of power transformers under transients
This thesis presents the results related to high frequency modeling of power transformers. First, a 25kVA distribution transformer under lightning surges is tested in the laborator...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
 The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
Malware and Windows APIs: A Dangerous Duo
Malware and Windows APIs: A Dangerous Duo
This paper introduces its interaction with malware and Windows APIs (application programming interface). The first section describes malware and investigates various types such as ...
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on ...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...

Back to Top