Detection Method for Classifying Malicious Firmware
نویسندگان
چکیده
A malicious firmware update may prove devastating to the embedded devices both that make up Internet of Things (IoT) and typically lack same security verifications now applied full operating systems. This work converts binary headers 40,000 examples from bytes into 1024-pixel thumbnail images train a deep neural network. The aim is distinguish benign variants using modern learning methods without needing detailed functional or forensic analysis tools. One outcome this image conversion enables contact with vast machine literature already handle digit recognition (MNIST). Another result indicates greater than 90% accurate classifications possible image-based convolutional networks (CNN) when combined transfer methods. envisioned CNN application would intercept updates before their distribution IoT score likelihood containing variants. To explain how model makes classification decisions, research applies traditional statistical such as single ensembles decision trees identifiable pixel byte values contribute determination.
منابع مشابه
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating system is loaded, it can easily circumvent any operating system-based security mechanism. Boot firmware programs are typically written by third-party device manufacturers and may come from various suppliers of unknown origin....
متن کاملImplications of Malicious 3D Printer Firmware
The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification and intellectual property protection. This research develops and implements malicious code using Printrbot’s branch of the open source Marlin 3D printer firmware. Implementa...
متن کاملClassifying Malicious Windows Executables Using Anomaly Based Detection
CLASSIFYING MALICIOUS WINDOWS EXECUTABLES USING ANOMALY BASED DETECTION by Ronak Sutaria A malicious executable is broadly defined as any program or piece of code designed to cause damage to a system or the information it contains, or to prevent the system from being used in a normal manner. A generic term used to describe any kind of malicious software is Malware, which includes Viruses, Worms...
متن کاملislanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولA Hybrid Malicious Code Detection Method based on Deep Learning
In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of network security and applications
سال: 2021
ISSN: ['0975-2307', '0974-9330']
DOI: https://doi.org/10.5121/ijnsa.2021.13601