Netinfo Security ›› 2023, Vol. 23 ›› Issue (5): 62-75.doi: 10.3969/j.issn.1671-1122.2023.05.007

Previous Articles     Next Articles

Identification Method of Malicious Software Hidden Function Based on Siamese Architecture

CHEN Zitong, JIA Peng(), LIU Jiayong   

  1. School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China
  • Received:2022-12-15 Online:2023-05-10 Published:2023-05-15
  • Contact: JIA Peng E-mail:pengjia@scu.edu.cn

Abstract:

At present, hiding technology has been widely used in malware to avoid the detection of anti-virus engines and reverse analysis by researchers. Therefore, effective identification of hidden functions in malware is of great significance for malware code detection and in-depth analysis. However, in this field, the existing methods have more or less problems, such as inability to obtain high accuracy, poor robustness to data sets with small sample size or unbalanced distribution of sample categories. In order to implement a practical detection method for malicious software hidden functions, a novel identification method based on Siamese architecture is proposed to detect the type of hidden functions. This method can effectively improve the accuracy of hidden function recognition, and the introduction of Siamese architecture improves the problem of poor robustness of small sample size data sets. For the dataset of 15 common types of hidden functions extracted from malicious software, the experimental results show that the embedded vector generated by this method has better quality than the nearest embedded neural network SAFE, and this method has higher detection accuracy than several common hidden function detection tools.

Key words: binary analysis, hidden function detection, neural network, instruction embedding

CLC Number: