Ieee Access Image Malware Aug22
Ieee Access Image Malware Aug22
Ieee Access Image Malware Aug22
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.DOI
ABSTRACT Currently, malware is increasing in both number and complexity dramatically. Several
techniques and methodologies have been proposed to detect and neutralize malicious software. However,
traditional methods based on the signatures or behaviors of malware often require considerable compu-
tational time and resources for feature engineering. Recent studies have applied machine learning to the
problems of identifying and classifying malware families. Combining many state-of-the-art techniques has
become popular but choosing the appropriate combination with high efficiency is still a problem. The
classification performance has been significantly improved using complex neural network architectures.
However, the more complex the network, the more resources it requires. This paper proposes a novel
lightweight architecture by combining small Convolutional Neural Networks and advanced Variational
Autoencoder, enhanced by channel and spatial attention mechanisms. We achieve overperformance and
sufficient time through various experiments compared to other cutting-edge techniques using unbalanced
and balanced Malimg datasets.
INDEX TERMS Malware Classification, Variational Autoencoder, channel attention, spatial attention,
latent representation, information security.
I. INTRODUCTION strings that are all embedded in raw bytes of the Portable
The Internet has become an essential function in our lives. Executable (PE) [4]. The main limitation of static analysis
However, at the same time, it also raises many security threats is that it is not sufficient in the case of code obfuscation
while providing excellent service. Malware is a powerful and zero-malware. In addition, the analysis will be time-
tool for an attacker to intrude, sabotage, and control a tar- consuming if malware is mixed up with many disruptive
get indirectly as a remote administration tool through the methods.
Internet. The abuse of various malware causes a significant On the other hand, dynamic analysis investigates the mal-
impact on cyber-security and threats to individuals, society, ware as they are executed in simulated environments like
and countries [1], [2]. Authors of malware mix different sandboxes or virtual machines [5]. This analysis does not
evading techniques such as user interaction, environment require disassembling the PE file and decompression and un-
awareness, obfuscation, code compression, and code en- packing in advance to gain malware’s features as static anal-
cryption to change existing malicious code’s appearance to ysis. The main limitation of this analysis is that the dynamic
bypass the Anti-virus System and Intrusion Detection System analysis may not always uncover malicious behavior because
(IDS). However, it is often the case that the new variants still some malware can detect virtual environments and change
have the same malicious intentions and characteristics as the its behavior. Moreover, because of the rapid development of
original malware. many automatic malware creation tools [6], these methods
There are two malware detection and analysis techniques: cannot catch up to the speed of malware generation.
static analysis and dynamic analysis. The static analysis in- Machine learning has become more potent because its
vestigates the malware without executing them [3]. This type highly developed algorithms can solve most problems en-
of analysis utilizes various information, such as Application countered in almost every field. Several methods extract
Programming Interface (API) calls, the entropy of files, and elements from malicious software, such as API calls [7],
VOLUME 4, 2016 1
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T..V Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
[8], and feed them into machine learning. Some of them So far, recent studies have focused mainly on the depth and
take advantage of Natural Language Processing (NLP) to width of Neural Networks and increase amount of features
solve strings element for detection [9] and classification tasks but have not yet focused on enriching the quanlity of object
[10]. Existing malware classification research uses machine features. This paper aims to gather as many worthwhile
learning techniques like Support Vector Machine (SVM) features as possible while keeping small model architecture
[11], K-Nearest Neighbor [12], and Random Forest [13]. by utilizing CNN and combining it with a new type of
Another alternative to the machine learning-based method Variational Autoencoder enhanced by the Attention mecha-
for malware classification is the vision-based approach nism, which we call “AVAE”. The AVAE can provide more
[14-39]. Although attackers use obfuscation techniques to discriminate features, map and refine the original feature
achieve spoofing, malware variants from the same family still space to latent representation.
maintain similar code and data order, which may not appear The main contribution of this paper is providing an image-
in the same location. The convolutional Neural Networks based malware classification system through feature syn-
(CNN) can extract common features from a family. Conti thesis from VAE, CNN, and attention mechanism. Because
et al. have proposed a method to visualize malware binaries the processing is merely dependent on images, the system
into a grayscale image and noticed that visual analyses of does not require in-depth knowledge of the malware and
malware binary help distinguish various regions of data from the environment to determine its behavior. Moreover, some
the image [15]. The advantage of the malware visualization classifiers can give the result in under a second, so our model
analysis is that it does not require using any decompilers or a can be applied in real-time countermeasures against malware.
dynamic running environment. Moreover, malware samples The rest of the paper is organized as follows: Section
are converted into RGB (Red, Green, Blue) in [16] by encod- 2 discusses the related work concerning some popular and
ing and arranging bytes from binary files. A color image can recent techniques in malware detection and classification.
obtain more information than a grayscale image. Section 3 illustrates the proposed model in detail. Section 4
The growth of high-performance computing, coupled with evaluates the performance of the proposed approach. Finally,
the huge CNNs architectures, made it possible to process we summarize our work in Section 5.
images at a higher level of complexity. However, recent
studies indicate that fewer parameters with a simple network
II. RELATED WORK
structure give relatively satisfactory results and can be ap-
plied to low-profile devices like IoT [17] or smartphones In this session, we investigate various new studies on image-
[18]. Taking advances from different well-known CNN ar- based malware classification, ranging from models with sim-
chitectures, Transfer learning is also applied for image-based ple structures to complex ones; some hybrid models with
malware classification [19], [24], [25], [28], [30]. By using different structural combinations have achieved high perfor-
pre-trained CNNs and fine-tuning them, several CNNs can mance in malware classification.
extract rich features more than simple ones [19]. For the first time, Nataraj et al. proposed a novel approach
Another approach that can be used to extract features of for visualizing and classifying malware using image process-
an image is Autoencoder (AE). AE is an unsupervised deep ing techniques [12]. They visualized malware as a gray-scale
learning algorithm with a unique neural network structure. image based on the observation that images of the same class
AE transforms the input into an output with minimal recon- were very similar in layout and texture. They utilize GIST
struction errors and can process with small data. However, descriptor, based on wavelet decomposition of an image, as
AE often falls into overfitting, and the problem of organizing feature extractor and k-nearest neighbor(kNN) as a classifier.
the latent space is complex. VAE is then introduced as an The paper achieved an accuracy of 97.18% on their intro-
autoencoder whose training is regularised to avoid overfitting duced dataset: Malimg, which contains 9,339 malware sam-
and ensure that the latent space has suitable properties that ples related to 25 different malware families. Other feature
enable a generative process. While VAE can represent global descriptors are also applied as HOG and HOC+GIST [22].
features through latent space, CNN capture local feature However, this method is not suitable for processing a massive
through small kernels. The combination of VAE and CNN amount of malware because of the high computational cost.
promises to obtain an overall feature of the object [32]. Naeem et al. [23] utilized a new type of feature descriptor by
However, this combination still did not achieve the expected combining and balancing collective local and global feature
performance. vectors. As a result, they achieved a high classification rate
For now, attention mechanisms [20] have been a significant of 98% on the Malimg dataset.
breakthrough in deep learning. The mechanisms have been The current research focuses on building a complex net-
widely used in image recognition, NLP, and speech recog- work model with deep CNN. For example, more than ten
nition. However, few studies on malware classification are Conv layers [2], VGG16 in [24], VGG19 in [25], or Com-
based on attention mechanisms in terms of computer vision. bining multiple CNN architectures [19]. On the other hand,
Moreover, compared to multi-head attention [20], this type [26] minimize parameters to speed up training. The proposed
of attention tends to feedforward CNN and can be applied at model achieves the accuracy, which is lower, approximately
every convolutional block in deep networks. under 1%, than the state-of-the-art result, by reducing 99.7%
2 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T.V. Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T..V Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T.V. Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
Symbol Meaning
W Weight matrix of encoder
0.5 to avoid overfitting. Moreover, we use Adam as a fine-
W’ Weight matrix of decoder tuning optimizer with a minimal learning-rate = 0.001. In the
b Bias vector of encoder AVAE model, we insert CBAM in turn between convolutional
b’ Bias vector of decoder
ϕ Parameter for training encoder
layers. In latent representation, we use the mean vector, dense
θ Parameter for training decoder µ with latent dimension sets to 100. We concatenate these
x Training dataset extracted features with a fully connected layer of CNN. Both
z Representation of the input sample
xi datapoint i − th
the CNN model and AVAE model train low-resolution image
qϕ Encoder with the size of 64x64, and the number of epochs are 50.
qθ Decoder We utilize early stopping to finish training without im-
lVAE (x i , θ, ϕ) Loss function of VAE for a datapoint x i provement after five epochs. We use the typical classifiers al-
g Deterministic function
K Number of samples that are utilized to reparameterize z gorithm of machine learning to evaluate our system. In order
to evaluate our method, we utilize 10-fold Cross-Validation.
One of the ten subsamples is held out as validation data, and
qϕ (z|x) and the expected distribution p(z). This divergence the remaining nine subsamples are used as training data. This
measures the relation of q and p [34]. In the VAE, p(z) is process is repeated ten times with each of the ten subsamples
specified as a standard normal distribution with mean zero used as validation. The average of ten results is the quality of
and standard deviation, denoted as N (0, 1). If the encoder the method.
outputs representations z different from the standard normal
distribution, it will receive a penalty in the loss. Since the IV. EXPERIMENTAL RESULTS
gradient descent algorithm is not suitable to train a VAE with A. DATASET
a random variable z sampled from p(z), the loss function of This study evaluates our model using the Malimg Dataset
the VAE is re-parameterized as follows: consisting of 9,339 malware samples of 25 different families.
K Table 2 illustrates the number of malwares in each class. It is
i 1 X clear that the Malimg dataset is unbalanced; 2,949 images
lV AE (x , θ, ϕ) = − log pθ (xi | z i,k )
K (2) represent the Allaple. A malware family, while merely 80
k=1
+DKL (qϕ (z|xi ∥ p(z)) images are present in the Skintrim. N family. The imbalanced
datasets are a communal problem in machine learning in
Where z i,k = gϕ (ϵi,k , xi ), ϵk denotes N (0, 1). general, and computer vision in particular [28], [35], [36].
After training, the latent layers of VAE can be utilized for Furthermore, imbalanced data harms the performance of
a classification task. Then, the original data is passed through the CNNs because of causing underfitting and overfitting
the encoder part of VAE to generate the latent representation. [37]. There are two standard methods to deal with imbal-
anced class distribution problems; oversampling and un-
C. ATTENTION MECHANISM dersampling. Instead of adding more samples on lacking
The structure of the attention module is described in Figure malware families, [32] utilized image augmentation, which
3. There are two sequential sub-modules: Channel Attention generates new data from classes with less population in the
Module (CAM) and Spatial Attention Module (SAM). The dataset. However, using augmentation is an extremely high
former decomposes the input tensor into two subsequent computational cost. In this study, we adopt undersampling
vectors generated by Global Average Pooling and Global to balance the Malimg dataset. Specifically, we reduce the
Max Pooling, feeding into a multi-layer perceptron with one number of malware samples in all groups to the lowest
hidden layer. After that, both vectors are merged by using sample Skintrim.N family same with [38]. The total number
element-wise summation. The latter applies Max Pooling of variants now is less than one-fourth of 2,000 compared to
and Average Pooling across channels, then concatenate them, the original Malimg dataset.
followed by a convolution layer to generate a spatial attention
map. B. CLASSIFICATION RESULT
The model can learn what and where to emphasize or We utilized some standard classifiers for the unbalanced
suppress and refines intermediate features effectively through Malimg dataset. The result is shown in Table 3. Random For-
the attention mechanism, [40]. In this paper, we apply both est (RF) classifier achieves the highest accuracy of 99.40%,
CAM and SAM. It is called Convolutional Block Attention while Nearest Centroid runs fastest with merely 0.11 seconds
Module (CBAM) [40] in the encoder part of VAE. We name with an accuracy difference of 1.26% compared to RF in the
it as Attention of Variational Autoencoder (AVAE). 10-fold Cross-Validation. Table 8 depicts a confusion matrix
that gives the detailed performance of the proposed method
D. FEATURE COMBINATION AND CLASSIFICATION using the Random Forest classifier. As can be seen, 22 out
Fig. 4 illustrates the architecture of our system. We utilize of 24 families attain F-scores greater than 90%, 88.1%, and
the lightweight CNN with merely two convolutional layers 89.2% of Swizzor.gen!E and Swizzor.gen!I, respectively.
with a kernel size is 32, followed by 64. Before flattening The balanced Malimg dataset of results is shown in Table
the pooled feature map, we apply dropout with a rate = 4. Even though the number of data is reduced dramatically,
VOLUME 4, 2016 5
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T..V Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
we still achieve high accuracy of 98.40% when using the lightweight proposed model improves accuracy significantly
RF classifier. The result shows that our method can extract and saves the computational cost. Moreover, the time to
crucial features of image-based malware. Compared to the classify each malicious code only takes an average of 0.01s.
previous study, our proposed method reduces by 1% while Complex architectures such as [25], [30], [32] require high
[38] reduces four times by 4%. The results of the unbalanced image quality and computational processing capacity. The
Malimg dataset compared with the results of other studies reason for using complex networks is that the deep layers
using the same dataset are shown in Table 7. are expected to extract specific features such as ears and
eyes in image processing tasks concerned with humans. On
As shown in Table 7, the Lightweight CNNs of Roseline the other hand, the shallow layers focus on overall image
et al. [29] proposed with merely 0.83M parameters, but the features such as edges of the objects. For example, in Fig. 2,
result does not change sharply since the first-time dataset many uncomplicated elements can be found by observing the
was introduced by Nataraj et al. [12] by 0.31% from 97.18% simple grayscale of malware samples. Therefore, we focus
to 97.49%. That proves that using only a few parameters is on the first layers to extract adequate features with a smaller
not necessarily extracting enough features of the object. On image size of 64x64, still ensuring high accuracy.
the other hand, utilizing a model with enormous parameters The Malimg dataset contains many samples processed
such as ResNet-50 [30] and VGG19 [25] improved the result through obfuscation techniques such as encryption and pack-
slightly; however, it requires more computational power. ing. Among them, malware samples belonging to Adialer.C,
Nevertheless, using a sufficient number of parameters, our Autorun.K, Lolyda.AT, Malex.gen!J, VB.AT, Yuner.A are
6 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T.V. Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
TABLE 2. Original Malimg Dataset TABLE 4. Performance comparision for the various classifier on balanced
Malimg Dataset. Best configuration was highlighted with bold characters.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T..V Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
TABLE 8. Unbalanced Malimg dataset confusion matrix for 10-fold cross validation using RF classifier
8 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T.V. Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
tion and new malware detection using machine learning,” emphFrontiers ing Models”, emphApplied Sciences, vol. 11, no. 14, 2021, Art. no. 6446.
Inf. Technol. Electron. Eng., vol. 18, no. 9, pp. 1336–1347, Sep. 2017. DOI:10.3390/app11146446.
DOI:10.1631/FITEE.1601325. [29] A. Roseline, G. Hari, S. Geetha, R. Krishnamurthy, “Vision-Based Mal-
[8] Q. Qian and M. Tang, “Dynamic API call sequence visualisation for ware Detection and Classification Using Lightweight Deep Learning
malware classification,” IET Inf. Secur., vol. 13, no. 4, pp. 367–377, Oct. Paradigm”, in /emphComputer Vision and Image Processing, pp. 62-73,
2018. DOI:10.1049/iet-ifs.2018.5268. 2020.
[9] M. Mimura, “An Improved Method of Detecting Macro Malware on an [30] E. Rezende, G. Ruppert, T. Carvalho, F. Ramos,P. De Geus, “Malicious
Imbalanced Dataset”, IEEE Access , vol. 8, pp. 204709 – 204717, Nov. software classification using transfer learning of RESNET-50 deep neural
2020. DOI: 10.1109/ACCESS.2020.3037330. network”, in Proceedings 16th IEEE International Conference on Machine
[10] K. Tran and H. Sato, “NLP-based approaches for malware clas- Learning and Applications, Dec. 2017. DOI:10.1109/ICMLA.2017.00-19.
sification from API sequences”, emph21st Asia Pacific Sympo- [31] M. Nisa, J.H Shah, S. Kanwal, M. Raza, M.A Khan, R. Damaševicius, T.
sium on Intelligent and Evolutionary Systems (IES), Nov. 2017. Blažauskas, “Hybrid malware classification method using segmentation-
DOI:10.1109/IESYS.2017.8233569. based fractal texture analysis and deep convolution neural network
[11] A.M. Agarap, “Towards Building an intelligent Anti-Malware System: features”, Applied Sciences, vol. 10, July. 2020, Art. no. 4966.
A Deep Learning Approach using Support Vector Machine (SVM) for DOI:10.3390/app10144966.
Malware Classification”, arXiv preprint 2017, arXiv:1801.00318. [32] R.Burks, K.A Islam, J. Li, Y. Lu, “Data augmentation
[12] L. Nataraj, S. Karthikeyan, G. Jacob and B.S. Manjunath, “Malware with generative models for improved malware detection: a
images: visualization and automatic classification”. Proceedings of the comparative study”, The IEEE 10th Annual Ubiquitous Computing,
8th International Symposium on Visualization for Cyber Security , 2011. Electronics & Mobile Communication Conference, Oct. 2019.
DOI:10.1145/2016904.2016908. DOI:10.1109/UEMCON47517.2019.8993085.
[13] F.C.C. Garcia and F.P. Muga II, “Random Forest for Malware Classifica- [33] X. Ma, S. Guo, H. Li, Z. Pan, “How to Make Attention Mechanisms
tion”, aeXiv preprint 2016, arXiv:1609.07770. More Practical in Malware Classification”, IEEE Access, Oct. 2019.
DOI:10.1109/ACCESS.2019.2948358.
[14] L. Nataraj, S. Karthikeyan and B.S. Manjunath, “SATTVA: SpArsiTy
[34] D.P Kingma and M. Welling, “Auto-encoding variantional bayes”, aeXiv
inspired classificaTion of malware Variants”. Proceedings of the 3rd ACM
preprint 2013, arXiv: 1312.6114.
Workshop on Information Hiding and Multimedia Security, pp. 135–140,
[35] Ramasubramanian and H. Shanmugasundaram, “A Review on Classifica-
2015. DOI:10.1145/2756601.2756616.
tion of Data Imbalance using BigData”, International Journal of Manag-
[15] G. Conti, E. Dean, M. Sinda, B. Sangster, “Visual reverse engineering of
ing Information Technology, vol. 13, no. 03, pp. 09-22, Aug. 2021. DOI:
binary and data files”, Visualization for Computer Security, 5th Interna-
10.5121/ijmit.2021.13302.
tional Workshop, VizSec, Jan. 2008.
[36] F. Thabtah, S. Hammoud, F. Kamalov and A. Gonsalves, “Data imbalance
[16] D.L Vu, T.K Nguyen, T.V Nguyen, T.N Nguyen, F. Massacci and P.H.
in classification: Experimental evaluation”, Information Sciences, vol. 513,
Phung, “HIT4Mal: Hybrid image transformation for malware classifica-
no. 3, Nov. 2019. DOI:10.1016/j.ins.2019.11.004.
tion”, Transactions on Emerging Telecommunications Technologies, vol.
[37] K.S Kancherla, S. Mukkamala, “Image visualization based mal-
31, no. 5, Nov. 2019. DOI:10.1002/ett.3789.
ware detection”. In Proceedings of the 2013 IEEE Symposium on
[17] H. Naeem, F. Ullah, M.R. Naeem, S. Khalid, D. Vasan, S. Jabbar, S. Saeed, Computational Intelligence in Cyber Security (CICS), April. 2013.
“Malware detection in industrial internet of things based on hybrid image DOI:10.1109/CICYBS.2013.6597204.
visualization and deep learning model”, emphAd Hoc Networks, vol. 105, [38] S. Yajamanam,V.R.S Selvin, F.D. Troia, M. Stamp, ”Deep learning versus
no. 1, May. 2020. DOI:10.1016/j.adhoc.2020.102154. gist descriptors for image-based malware classification”, 2nd International
[18] Y. Ding, X. Zhang, J. Hu, W. Xu, “Android malware detection method Workshop on Formal methods for Security Engineering , pp. 553–561, Jan.
based on bytecode image”, Journal of Ambient Intelligence and Human- 2018. DOI:10.5220/ 0006685805530561.
ized Computing, 2020. DOI:10.1007/s12652-020-02196-4. [39] D. Gibert, C. Mateu, J. Planes, R. Vicens,” Using convolutional neural
[19] D. Vasan, M. Alazab, S. Wassan, B. Safaei, Q. Zheng, “Image- networks for classification of malware represented as images”, Journal of
Based malware classification using ensemble of CNN architectures (IM- Computer Virology and Hacking Techniques , vol. 15, no. 1, pp. 15–28.
CEC)”, Computers and Security, vol. 92, May. 2020, Art. no. 101748. DOI:10.1007/s11416-018-0323-0.
DOI:10.1016/j.cose.2020.101748. [40] S. Woo, J. Park, J.Y. Lee, I. Kweon, “CBAM: Convolutional Block
[20] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, “Attention Is All You Attention Module”, in Computer Vision – ECCV 2018, pp. 3-19, Sep.
Need”, in Proc. NIPS, pp.1-11, 2017. 2018.
[21] V. Anandhi, P.Vinod, V.G. Menon, “Malware visualization and detection [41] V. Moussas, A. Andretos, “Malware Detection Based on Code Vi-
using DenseNet”, in Personal and Ubiquitous Computing, July. 2021. sualization and Two-Level Classification”, information, Mar. 2021.
DOI:10.1007/s00779-021-01581-w. DOI:10.3390/info12030118.
[22] A. Bozkir, E. Tahillopglu, M. Aydos and I. Kara, “Catch them alive: A [42] B. N. Narayanan, O. Djaneye-Boundjou and T. M. Kebede, “Performance
malware detection approach through memory forensics, manifold learning Analysis of Machine Learning and Pattern Recognition Algorithms for
and computer vison”, “Computers and Secutiry”, vol. 103, Apr. 2021, Art. Malware Classification”, 2016 IEEE National Aerospace and Electronics
No. 102166. Conference (NAECON) and Ohio Innovation Summit (OSI),, Dayton, OH,
[23] H.Naeem, B.Guo, M.R. Naeem,F. Ullah, H. Aldabbas, M.S Javed, “Identi- 2016, pp. 338-342.
fication of malicious code variants based on image visualization”, Com- [43] V. S. P. Davuluru, B.N. Narayanan and E. J. Balster, “Convolutional Neural
puters and Electrical Engineering, vol. 76, pp. 225–237, Apr. 2019. Networks as Classification Tools and Feature Extractors for Distinguishing
DOI:10.1016/j.compeleceng.2019.03.015. Malware Programs”, 2019 IEEE National Aerospace and Electronics
[24] E. Rezende, G. Ruppert, T. Carvalho, A. Theophilo, F. Ramos, P. de Geus, Conference (NAECON), Dayton, OH, USA, 2019, pp. 273-278.
“Malicious software classification using VGG16 deep neural network’s [44] B. N. Narayanan and V. S. P. Davuluru, “Ensemble Malware Classification
bottleneck features”, Information Technology - New Generations, pp. 51- System using Deep Neural Networks”,in Electronics 2020, 9 (5), 721.
59, Jan. 2018.
[25] M. Awan, M. Mohoammed, A. Yasin, A. Zain, “Image-Based Mal-
ware Classification Using VGG19 Network and Spatial Convolutional
Attention”, in Electronics, vol. 10, no. 19, Oct. 2021, Art. no. 2444.
DOI:10.3390/electronics10192444.
[26] A. Çayır, U. Ünal, H. Dağ, “Random CapsNet forest model for imbalanced
malware type classification task” in Computers and Security, vol. 102,
2021, Art. no. 102133.
[27] V. Verma, S.K Muttoo, V.B Singh, “Multiclass malware classification via
first and second order texture statistics”, in Computers and Security, vol.
97, 2020, Art. no. 101895.
[28] W.Shafai, I. Almomani and A. AlKhayer, “Visualized Malware Multi-
Classification Framework Using Fine-Tuned CNN-Based Transfer Learn-
VOLUME 4, 2016 9
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3198072
T..V Dao, H. Sato, M. Kubo et al.: A Novel Combination of Light-weight Deep Learning Model for Image-Based Malware Classification
10 VOLUME 4, 2016
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/