Skip to content

Commit

Permalink
* update 2024-03-20 06:16:08
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Mar 19, 2024
1 parent bc97963 commit 5f85e51
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
12 changes: 12 additions & 0 deletions arXiv_db/Malware/2024.md
Original file line number Diff line number Diff line change
Expand Up @@ -650,3 +650,15 @@

</details>

<details>

<summary>2024-03-18 11:17:27 - Semantic Data Representation for Explainable Windows Malware Detection Models</summary>

- *Peter Švec, Štefan Balogh, Martin Homola, Ján Kľuka, Tomáš Bisták*

- `2403.11669v1` - [abs](http://arxiv.org/abs/2403.11669v1) - [pdf](http://arxiv.org/pdf/2403.11669v1)

> Ontologies are a standard tool for creating semantic schemata in many knowledge intensive domains of human interest. They are becoming increasingly important also in the areas that have been until very recently dominated by subsymbolic knowledge representation and machine-learning (ML) based data processing. One such area is information security, and specifically, malware detection. We thus propose PE Malware Ontology that offers a reusable semantic schema for Portable Executable (PE - the Windows binary format) malware files. This ontology is inspired by the structure of the EMBER dataset, which focuses on the static malware analysis of PE files. With this proposal, we hope to provide a unified semantic representation for the existing and future PE-malware datasets and facilitate the application of symbolic, neuro-symbolic, or otherwise explainable approaches in the PE-malware-detection domain, which may produce interpretable results described by the terms defined in our ontology. In addition, we also publish semantically treated EMBER data, including fractional datasets, to support the reproducibility of experiments on EMBER. We supplement our work with a preliminary case study, conducted using concept learning, to show the general feasibility of our approach. While we were not able to match the precision of the state-of-the-art ML tools, the learned malware discriminators were interesting and highly interpretable.

</details>

Loading

0 comments on commit 5f85e51

Please sign in to comment.