dc.contributor.author |
Seneviratne, S |
|
dc.contributor.author |
Shariffdeen, R |
|
dc.contributor.author |
Rasnayaka, S |
|
dc.contributor.author |
Kasthuriarachchi, N |
|
dc.date.accessioned |
2023-06-26T03:37:37Z |
|
dc.date.available |
2023-06-26T03:37:37Z |
|
dc.date.issued |
2022 |
|
dc.identifier.citation |
Seneviratne, S., Shariffdeen, R., Rasnayaka, S., & Kasthuriarachchi, N. (2022). Self-supervised vision transformers for malware detection. IEEE Access, 10, 103121–103135. https://doi.org/10.1109/ACCESS.2022.3206445 |
en_US |
dc.identifier.issn |
2169-3536( Online) |
en_US |
dc.identifier.uri |
http://dl.lib.uom.lk/handle/123/21157 |
|
dc.description.abstract |
Malware detection plays a crucial role in cyber-security with the increase in malware growth
and advancements in cyber-attacks. Previously unseen malware which is not determined by security vendors
are often used in these attacks and it is becoming inevitable to find a solution that can self-learn from
unlabeled sample data. This paper presents SHERLOCK, a self-supervision based deep learning model
to detect malware based on the Vision Transformer (ViT) architecture. SHERLOCK is a novel malware
detection method which learns unique features to differentiate malware from benign programs with the use
of image-based binary representation. Experimental results using 1.2 million Android applications across
a hierarchy of 47 types and 696 families, shows that self-supervised learning can achieve an accuracy of
97% for the binary classification of malware which is higher than existing state-of-the-art techniques. Our
proposed model is also able to outperform state-of-the-art techniques for multi-class malware classification
of types and family with macro-F1 score of .497 and .491 respectively. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.subject |
Self-Supervised Learning |
en_US |
dc.subject |
Deep Learning |
en_US |
dc.subject |
Malware Detection |
en_US |
dc.subject |
Android Security |
en_US |
dc.title |
Self-supervised vision rransformers for malware setection |
en_US |
dc.type |
Article-Full-text |
en_US |
dc.identifier.year |
2022 |
en_US |
dc.identifier.journal |
IEEE Access |
en_US |
dc.identifier.volume |
10 |
en_US |
dc.identifier.database |
IEEE Xplore |
en_US |
dc.identifier.pgnos |
103121–103135 |
en_US |
dc.identifier.email |
sachith.seneviratne@unimelb.edu.au |
en_US |
dc.identifier.email |
ridwan@u.nus.edu, sanka@nus.edu.sg |
en_US |
dc.identifier.email |
nuran.11@cse.mrt.ac.lk |
en_US |
dc.identifier.email |
sachith.seneviratne@unimelb.edu.au |
en_US |
dc.identifier.doi |
https://doi.org/10.1109/ACCESS.2022.3206445 |
en_US |