Skip to main content
Top
Published in: The Journal of Supercomputing 14/2023

17-04-2023

BejaGNN: behavior-based Java malware detection via graph neural network

Authors: Pengbin Feng, Li Yang, Di Lu, Ning Xi, Jianfeng Ma

Published in: The Journal of Supercomputing | Issue 14/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As a popular platform-independent language, Java is widely used in enterprise applications. In the past few years, language vulnerabilities exploited by Java malware have become increasingly prevalent, which cause threats for multi-platform. Security researchers continuously propose various approaches for fighting against Java malware programs. The low code path coverage and poor execution efficiency of dynamic analysis limit the large-scale application of dynamic Java malware detection methods. Therefore, researchers turn to extracting abundant static features to implement efficient malware detection. In this paper, we explore the direction of capturing malware semantic information by using graph learning algorithms and present BejaGNN (Behavior-based Java malware detection via Graph Neural Network), a novel behavior-based Java malware detection method using static analysis, word embedding technique, and graph neural network. Specifically, BejaGNN leverages static analysis techniques to extract ICFGs (Inter-procedural Control Flow Graph) from Java program files and then prunes these ICFGs to remove noisy instructions. Then, word embedding techniques are adopted to learn semantic representations for Java bytecode instructions. Finally, BejaGNN builds a graph neural network classifier to determine the maliciousness of Java programs. Experimental results on a public Java bytecode benchmark demonstrate that BejaGNN achieves high F1 98.8% and is superior to existing Java malware detection approaches, which verifies the promise of graph neural network in Java malware detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Balan G, Popescu AS (2018) Detecting java compiled malware using machine learning techniques. In: 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, pp 435–439 Balan G, Popescu AS (2018) Detecting java compiled malware using machine learning techniques. In: 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE, pp 435–439
5.
go back to reference Coker Z, Maass M, Ding T, Le Goues C, Sunshine J (2015) Evaluating the flexibility of the java sandbox. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp 1–10 Coker Z, Maass M, Ding T, Le Goues C, Sunshine J (2015) Evaluating the flexibility of the java sandbox. In: Proceedings of the 31st Annual Computer Security Applications Conference, pp 1–10
6.
go back to reference Ye Y, Li T, Adjeroh D, Iyengar SS (2017) A survey on malware detection using data mining techniques. ACM Comput Surv (CSUR) 50(3):1–40CrossRef Ye Y, Li T, Adjeroh D, Iyengar SS (2017) A survey on malware detection using data mining techniques. ACM Comput Surv (CSUR) 50(3):1–40CrossRef
7.
go back to reference You I, Yim K (2010) Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications. IEEE, pp 297–300 You I, Yim K (2010) Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications. IEEE, pp 297–300
8.
go back to reference Dahl GE, Stokes JW, Deng L, Yu D (2013) Large-scale malware classification using random projections and neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, pp 3422–3426 Dahl GE, Stokes JW, Deng L, Yu D (2013) Large-scale malware classification using random projections and neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, pp 3422–3426
9.
go back to reference Huang W, Stokes JW (2016) Mtnet: a multi-task neural network for dynamic malware classification. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, pp 399–418 Huang W, Stokes JW (2016) Mtnet: a multi-task neural network for dynamic malware classification. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, pp 399–418
10.
go back to reference Kolosnjaji B, Zarras A, Webster G, Eckert C (2016) Deep learning for classification of malware system call sequences. In: Australasian Joint Conference on Artificial Intelligence. Springer, pp 137–149 Kolosnjaji B, Zarras A, Webster G, Eckert C (2016) Deep learning for classification of malware system call sequences. In: Australasian Joint Conference on Artificial Intelligence. Springer, pp 137–149
11.
go back to reference Jha PK, Shankar P, Sujadevi V, Prabhaharan P (2018) Deepmal4j: Java malware detection employing deep learning. In: International Symposium on Security in Computing and Communication. Springer, pp 389–402 Jha PK, Shankar P, Sujadevi V, Prabhaharan P (2018) Deepmal4j: Java malware detection employing deep learning. In: International Symposium on Security in Computing and Communication. Springer, pp 389–402
12.
go back to reference Shalaginov A, Banin S, Dehghantanha A, Franke K (2018) Machine learning aided static malware analysis: a survey and tutorial. In: Cyber threat intelligence, pp 7–45 Shalaginov A, Banin S, Dehghantanha A, Franke K (2018) Machine learning aided static malware analysis: a survey and tutorial. In: Cyber threat intelligence, pp 7–45
13.
go back to reference Le Q, Boydell O, Mac Namee B, Scanlon M (2018) Deep learning at the shallow end: Malware classification for non-domain experts. Digit Investig 26:118–126CrossRef Le Q, Boydell O, Mac Namee B, Scanlon M (2018) Deep learning at the shallow end: Malware classification for non-domain experts. Digit Investig 26:118–126CrossRef
14.
go back to reference Jian Y, Kuang H, Ren C, Ma Z, Wang H (2021) A novel framework for image-based malware detection with a deep neural network. Comput Secur 109:102400CrossRef Jian Y, Kuang H, Ren C, Ma Z, Wang H (2021) A novel framework for image-based malware detection with a deep neural network. Comput Secur 109:102400CrossRef
15.
go back to reference Obaidat I, Sridhar M, Pham KM, Phung PH (2022) Jadeite: a novel image-behavior-based approach for java malware detection using deep learning. Comput Secur 113:102547CrossRef Obaidat I, Sridhar M, Pham KM, Phung PH (2022) Jadeite: a novel image-behavior-based approach for java malware detection using deep learning. Comput Secur 113:102547CrossRef
16.
go back to reference Vallee-Rai R, Hendren LJ (1998) Jimple: simplifying java bytecode for analyses and transformations. Technical report, McGill University Vallee-Rai R, Hendren LJ (1998) Jimple: simplifying java bytecode for analyses and transformations. Technical report, McGill University
17.
go back to reference Yu Z, Cao R, Tang Q, Nie S, Huang J, Wu S (2020) Order matters: semantic-aware neural networks for binary code similarity detection. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol 34, pp 1145–1152 Yu Z, Cao R, Tang Q, Nie S, Huang J, Wu S (2020) Order matters: semantic-aware neural networks for binary code similarity detection. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol 34, pp 1145–1152
18.
go back to reference Gao H, Cheng S, Zhang W (2021) Gdroid: android malware detection and classification with graph convolutional network. Comput Secur 106:102264CrossRef Gao H, Cheng S, Zhang W (2021) Gdroid: android malware detection and classification with graph convolutional network. Comput Secur 106:102264CrossRef
19.
go back to reference Sun Q, Abdukhamidov E, Abuhmed T, Abuhamad M (2022) Leveraging spectral representations of control flow graphs for efficient analysis of windows malware. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp 1240–1242 Sun Q, Abdukhamidov E, Abuhmed T, Abuhamad M (2022) Leveraging spectral representations of control flow graphs for efficient analysis of windows malware. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp 1240–1242
20.
go back to reference Yamaguchi F, Golde N, Arp D, Rieck K (2014) Modeling and discovering vulnerabilities with code property graphs. In: 2014 IEEE Symposium on Security and Privacy. IEEE, pp 590–604 Yamaguchi F, Golde N, Arp D, Rieck K (2014) Modeling and discovering vulnerabilities with code property graphs. In: 2014 IEEE Symposium on Security and Privacy. IEEE, pp 590–604
21.
go back to reference Siow JK, Liu S, Xie X, Meng G, Liu Y (2022) Learning program semantics with code representations: an empirical study. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE Siow JK, Liu S, Xie X, Meng G, Liu Y (2022) Learning program semantics with code representations: an empirical study. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE
22.
go back to reference Bowman B, Huang HH (2021) Towards next-generation cybersecurity with graph ai. ACM SIGOPS Oper Syst Rev 55(1):61–67CrossRef Bowman B, Huang HH (2021) Towards next-generation cybersecurity with graph ai. ACM SIGOPS Oper Syst Rev 55(1):61–67CrossRef
23.
go back to reference Yang W, Kong D, Xie T, Gunter CA (2017) Malware detection in adversarial settings: exploiting feature evolutions and confusions in android apps. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp 288–302 Yang W, Kong D, Xie T, Gunter CA (2017) Malware detection in adversarial settings: exploiting feature evolutions and confusions in android apps. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp 288–302
24.
go back to reference Narayanan A, Chandramohan M, Chen L, Liu Y (2018) A multi-view context-aware approach to android malware detection and malicious code localization. Empir Softw Eng 23(3):1222–1274CrossRef Narayanan A, Chandramohan M, Chen L, Liu Y (2018) A multi-view context-aware approach to android malware detection and malicious code localization. Empir Softw Eng 23(3):1222–1274CrossRef
25.
go back to reference Ou F, Xu J (2022) S3feature: a static sensitive subgraph-based feature for android malware detection. Comput Secur 112:102513CrossRef Ou F, Xu J (2022) S3feature: a static sensitive subgraph-based feature for android malware detection. Comput Secur 112:102513CrossRef
26.
go back to reference Anderson HS, Kharkar A, Filar B, Roth P (2017) Evading machine learning malware detection. black Hat 2017 Anderson HS, Kharkar A, Filar B, Roth P (2017) Evading machine learning malware detection. black Hat 2017
27.
go back to reference Macedo HD, Touili T (2013) Mining malware specifications through static reachability analysis. In: European Symposium on Research in Computer Security. Springer, pp 517–535 Macedo HD, Touili T (2013) Mining malware specifications through static reachability analysis. In: European Symposium on Research in Computer Security. Springer, pp 517–535
28.
go back to reference Osorio FCC, Qiu H, Arrott A (2015) Segmented sandboxing-a novel approach to malware polymorphism detection. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, pp 59–68 Osorio FCC, Qiu H, Arrott A (2015) Segmented sandboxing-a novel approach to malware polymorphism detection. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, pp 59–68
29.
go back to reference Damodaran A, Troia FD, Visaggio CA, Austin TH, Stamp M (2017) A comparison of static, dynamic, and hybrid analysis for malware detection. J Comput Virol Hacking Tech 13:1–12CrossRef Damodaran A, Troia FD, Visaggio CA, Austin TH, Stamp M (2017) A comparison of static, dynamic, and hybrid analysis for malware detection. J Comput Virol Hacking Tech 13:1–12CrossRef
30.
go back to reference Hardy W, Chen L, Hou S, Ye Y, Li X (2016) Dl4md: a deep learning framework for intelligent malware detection. In: Proceedings of the International Conference on Data Science (ICDATA). The Steering Committee of The World Congress in Computer Science, Computer, p 61 Hardy W, Chen L, Hou S, Ye Y, Li X (2016) Dl4md: a deep learning framework for intelligent malware detection. In: Proceedings of the International Conference on Data Science (ICDATA). The Steering Committee of The World Congress in Computer Science, Computer, p 61
31.
go back to reference Athiwaratkun B, Stokes JW (2017) Malware classification with lstm and gru language models and a character-level cnn. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 2482–2486 Athiwaratkun B, Stokes JW (2017) Malware classification with lstm and gru language models and a character-level cnn. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 2482–2486
32.
go back to reference Lakhotia A, Preda MD, Giacobazzi R (2013) Fast location of similar code fragments using semantic’juice’. In: Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, pp 1–6 Lakhotia A, Preda MD, Giacobazzi R (2013) Fast location of similar code fragments using semantic’juice’. In: Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop, pp 1–6
33.
go back to reference Fass A, Backes M, Stock B (2019) Jstap: a static pre-filter for malicious javascript detection. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp 257–269 Fass A, Backes M, Stock B (2019) Jstap: a static pre-filter for malicious javascript detection. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp 257–269
34.
go back to reference Park YH, Reeves DS, Stamp M (2013) Deriving common malware behavior through graph clustering. Comput Secur 39:419–430CrossRef Park YH, Reeves DS, Stamp M (2013) Deriving common malware behavior through graph clustering. Comput Secur 39:419–430CrossRef
35.
go back to reference Yajamanam S, Selvin VRS, Di Troia F, Stamp M (2018) Deep learning versus gist descriptors for image-based malware classification. In: 2nd International Workshop on Formal Methods for Security Engineering (ForSE 2018), pp 553–561 Yajamanam S, Selvin VRS, Di Troia F, Stamp M (2018) Deep learning versus gist descriptors for image-based malware classification. In: 2nd International Workshop on Formal Methods for Security Engineering (ForSE 2018), pp 553–561
36.
go back to reference Cui Z, Du L, Wang P, Cai X, Zhang W (2019) Malicious code detection based on cnns and multi-objective algorithm. J Parallel Distrib Comput 129:50–58CrossRef Cui Z, Du L, Wang P, Cai X, Zhang W (2019) Malicious code detection based on cnns and multi-objective algorithm. J Parallel Distrib Comput 129:50–58CrossRef
37.
go back to reference Cho M, Kim J-S, Shin J, Shin I (2020) Mal2d: 2d based deep learning model for malware detection using black and white binary image. IEICE Trans Inf Syst 103(4):896–900CrossRef Cho M, Kim J-S, Shin J, Shin I (2020) Mal2d: 2d based deep learning model for malware detection using black and white binary image. IEICE Trans Inf Syst 103(4):896–900CrossRef
38.
go back to reference Nisa M, Shah JH, Kanwal S, Raza M, Khan MA, Damaševičius R, Blažauskas T (2020) Hybrid malware classification method using segmentation-based fractal texture analysis and deep convolution neural network features. Appl Sci 10(14):4966CrossRef Nisa M, Shah JH, Kanwal S, Raza M, Khan MA, Damaševičius R, Blažauskas T (2020) Hybrid malware classification method using segmentation-based fractal texture analysis and deep convolution neural network features. Appl Sci 10(14):4966CrossRef
39.
go back to reference Vasan D, Alazab M, Wassan S, Naeem H, Safaei B, Zheng Q (2020) Imcfn: image-based malware classification using fine-tuned convolutional neural network architecture. Comput Netw 171:107138CrossRef Vasan D, Alazab M, Wassan S, Naeem H, Safaei B, Zheng Q (2020) Imcfn: image-based malware classification using fine-tuned convolutional neural network architecture. Comput Netw 171:107138CrossRef
40.
go back to reference Prajapati P, Stamp M (2021) An empirical analysis of image-based learning techniques for malware classification. In: Malware analysis using artificial intelligence and deep learning, pp 411–435 Prajapati P, Stamp M (2021) An empirical analysis of image-based learning techniques for malware classification. In: Malware analysis using artificial intelligence and deep learning, pp 411–435
41.
go back to reference Acar A, Lu L, Uluagac AS, Kirda E (2019) An analysis of malware trends in enterprise networks. In: International Conference on Information Security. Springer, pp 360–380 Acar A, Lu L, Uluagac AS, Kirda E (2019) An analysis of malware trends in enterprise networks. In: International Conference on Information Security. Springer, pp 360–380
42.
go back to reference Qiu J, Zhang J, Luo W, Pan L, Nepal S, Xiang Y (2020) A survey of android malware detection with deep neural models. ACM Comput Surv (CSUR) 53(6):1–36CrossRef Qiu J, Zhang J, Luo W, Pan L, Nepal S, Xiang Y (2020) A survey of android malware detection with deep neural models. ACM Comput Surv (CSUR) 53(6):1–36CrossRef
43.
go back to reference Ding Y, Wu R, Xue F (2018) Detecting android malware using bytecode image. In: International Conference on Cognitive Computing. Springer, pp 164–169 Ding Y, Wu R, Xue F (2018) Detecting android malware using bytecode image. In: International Conference on Cognitive Computing. Springer, pp 164–169
44.
go back to reference Xiao X, Yang S (2019) An image-inspired and cnn-based android malware detection approach. In: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, pp 1259–1261 Xiao X, Yang S (2019) An image-inspired and cnn-based android malware detection approach. In: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, pp 1259–1261
45.
go back to reference Yadav P, Menon N, Ravi V, Vishvanathan S, Pham TD (2022) Efficientnet convolutional neural networks-based android malware detection. Comput Secur 115:102622CrossRef Yadav P, Menon N, Ravi V, Vishvanathan S, Pham TD (2022) Efficientnet convolutional neural networks-based android malware detection. Comput Secur 115:102622CrossRef
46.
go back to reference Pizzolotto D, Fellin R, Ceccato M (2019) Oblive: seamless code obfuscation for java programs and android apps. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, pp 629–633 Pizzolotto D, Fellin R, Ceccato M (2019) Oblive: seamless code obfuscation for java programs and android apps. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, pp 629–633
47.
go back to reference Schlumberger J, Kruegel C, Vigna G (2012) Jarhead analysis and detection of malicious java applets. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp 249–257 Schlumberger J, Kruegel C, Vigna G (2012) Jarhead analysis and detection of malicious java applets. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp 249–257
48.
go back to reference Gassen J, Chapman JP (2014) Honeyagent: detecting malicious java applets by using dynamic analysis. In: 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). IEEE, pp 109–117 Gassen J, Chapman JP (2014) Honeyagent: detecting malicious java applets by using dynamic analysis. In: 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). IEEE, pp 109–117
49.
go back to reference Herrera A, Cheney B (2015) Jmd: a hybrid approach for detecting java malware. In: Proceedings of the 13th Australasian Information Security Conference (AISC 2015). vol 27, p 30 Herrera A, Cheney B (2015) Jmd: a hybrid approach for detecting java malware. In: Proceedings of the 13th Australasian Information Security Conference (AISC 2015). vol 27, p 30
50.
go back to reference Kumar R, Vaishakh ARE (2016) Detection of obfuscation in java malware. Procedia Comput Sci 78:521–529CrossRef Kumar R, Vaishakh ARE (2016) Detection of obfuscation in java malware. Procedia Comput Sci 78:521–529CrossRef
51.
go back to reference Pinheiro R, Lima S, Fernandes S, Albuquerque E, Medeiros S, Souza D, Monteiro T, Lopes P, Lima R, Oliveira J et al. (2019) Next generation antivirus applied to jar malware detection based on runtime behaviors using neural networks. In: 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, pp 28–32 Pinheiro R, Lima S, Fernandes S, Albuquerque E, Medeiros S, Souza D, Monteiro T, Lopes P, Lima R, Oliveira J et al. (2019) Next generation antivirus applied to jar malware detection based on runtime behaviors using neural networks. In: 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, pp 28–32
52.
go back to reference Lam P, Bodden E, Lhoták O, Hendren L (2011) The soot framework for java program analysis: a retrospective. In: Cetus Users and Compiler Infastructure Workshop (CETUS 2011). vol 15 Lam P, Bodden E, Lhoták O, Hendren L (2011) The soot framework for java program analysis: a retrospective. In: Cetus Users and Compiler Infastructure Workshop (CETUS 2011). vol 15
53.
go back to reference Arzt S, Rasthofer S, Fritz C, Bodden E, Bartel A, Klein J, Le Traon Y, Octeau D, McDaniel P (2014) Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Not 49(6):259–269CrossRef Arzt S, Rasthofer S, Fritz C, Bodden E, Bartel A, Klein J, Le Traon Y, Octeau D, McDaniel P (2014) Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Not 49(6):259–269CrossRef
54.
go back to reference Nistor A, Song L, Marinov D, Lu S (2013) Toddler: detecting performance problems via similar memory-access patterns. In: 2013 35th International Conference on Software Engineering (ICSE). IEEE, pp 562–571 Nistor A, Song L, Marinov D, Lu S (2013) Toddler: detecting performance problems via similar memory-access patterns. In: 2013 35th International Conference on Software Engineering (ICSE). IEEE, pp 562–571
55.
go back to reference Holzinger P, Hermann B, Lerch J, Bodden E, Mezini M (2017) Hardening java’s access control by abolishing implicit privilege elevation. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE, pp 1027–1040 Holzinger P, Hermann B, Lerch J, Bodden E, Mezini M (2017) Hardening java’s access control by abolishing implicit privilege elevation. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE, pp 1027–1040
56.
go back to reference Bodden E (2012) Inter-procedural data-flow analysis with ifds/ide and soot. In: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis, pp 3–8 Bodden E (2012) Inter-procedural data-flow analysis with ifds/ide and soot. In: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program Analysis, pp 3–8
57.
go back to reference Chandak A, Lee W, Stamp M (2021) A comparison of word2vec, hmm2vec, and pca2vec for malware classification. In: Malware analysis using artificial intelligence and deep learning, pp 287–320 Chandak A, Lee W, Stamp M (2021) A comparison of word2vec, hmm2vec, and pca2vec for malware classification. In: Malware analysis using artificial intelligence and deep learning, pp 287–320
58.
go back to reference Kale AS, Pandya V, Di Troia F, Stamp M (2022) Malware classification with word2vec, hmm2vec, bert, and elmo. J Comput Virol Hacking Tech 19:1–16CrossRef Kale AS, Pandya V, Di Troia F, Stamp M (2022) Malware classification with word2vec, hmm2vec, bert, and elmo. J Comput Virol Hacking Tech 19:1–16CrossRef
59.
go back to reference Kwon O, Kim D, Lee S-R, Choi J, Lee S (2021) Handling out-of-vocabulary problem in hangeul word embeddings. In: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, pp 3213–3221 Kwon O, Kim D, Lee S-R, Choi J, Lee S (2021) Handling out-of-vocabulary problem in hangeul word embeddings. In: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, pp 3213–3221
60.
go back to reference Duan Y, Li X, Wang J, Yin H (2020) Deepbindiff: learning program-wide code representations for binary diffing. In: Network and Distributed System Security Symposium Duan Y, Li X, Wang J, Yin H (2020) Deepbindiff: learning program-wide code representations for binary diffing. In: Network and Distributed System Security Symposium
61.
go back to reference Xu Y, Xu Z, Chen B, Song F, Liu Y, Liu T (2020) Patch based vulnerability matching for binary programs. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 376–387 Xu Y, Xu Z, Chen B, Song F, Liu Y, Liu T (2020) Patch based vulnerability matching for binary programs. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 376–387
62.
go back to reference Xu K, Li Y, Deng RH, Chen K (2018) Deeprefiner: multi-layer android malware detection system applying deep neural networks. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P). IEEE, pp 473–487 Xu K, Li Y, Deng RH, Chen K (2018) Deeprefiner: multi-layer android malware detection system applying deep neural networks. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P). IEEE, pp 473–487
63.
go back to reference Pennington J, Socher R, Manning CD (2014) Glove: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp 1532–1543 Pennington J, Socher R, Manning CD (2014) Glove: global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp 1532–1543
64.
go back to reference Bojanowski P, Grave E, Joulin A, Mikolov T (2017) Enriching word vectors with subword information. Trans Assoc Comput Linguist 5:135–146CrossRef Bojanowski P, Grave E, Joulin A, Mikolov T (2017) Enriching word vectors with subword information. Trans Assoc Comput Linguist 5:135–146CrossRef
65.
go back to reference Le Q, Mikolov T (2014) Distributed representations of sentences and documents. In: International Conference on Machine Learning. PMLR, pp 1188–1196 Le Q, Mikolov T (2014) Distributed representations of sentences and documents. In: International Conference on Machine Learning. PMLR, pp 1188–1196
66.
go back to reference Zhou J, Cui G, Hu S, Zhang Z, Yang C, Liu Z, Wang L, Li C, Sun M (2020) Graph neural networks: a review of methods and applications. AI Open 1:57–81CrossRef Zhou J, Cui G, Hu S, Zhang Z, Yang C, Liu Z, Wang L, Li C, Sun M (2020) Graph neural networks: a review of methods and applications. AI Open 1:57–81CrossRef
67.
go back to reference Cai H, Zheng VW, Chang KC-C (2018) A comprehensive survey of graph embedding: Problems, techniques, and applications. IEEE Trans Knowl Data Eng 30(9):1616–1637CrossRef Cai H, Zheng VW, Chang KC-C (2018) A comprehensive survey of graph embedding: Problems, techniques, and applications. IEEE Trans Knowl Data Eng 30(9):1616–1637CrossRef
68.
go back to reference Mercaldo F, Santone A (2020) Deep learning for image-based mobile malware detection. J Comput Virol Hacking Tech 16(2):157–171CrossRef Mercaldo F, Santone A (2020) Deep learning for image-based mobile malware detection. J Comput Virol Hacking Tech 16(2):157–171CrossRef
69.
go back to reference Yuan H, Yu H, Gui S, Ji S (2022) Explainability in graph neural networks: a taxonomic survey. IEEE Trans Pattern Anal Mach Intell 45(5):5782–5799 Yuan H, Yu H, Gui S, Ji S (2022) Explainability in graph neural networks: a taxonomic survey. IEEE Trans Pattern Anal Mach Intell 45(5):5782–5799
70.
go back to reference Xie Y, Xu Z, Zhang J, Wang Z, Ji S (2022) Self-supervised learning of graph neural networks: a unified review. IEEE Trans Pattern Anal Mach Intell 45(2):2412–2429CrossRef Xie Y, Xu Z, Zhang J, Wang Z, Ji S (2022) Self-supervised learning of graph neural networks: a unified review. IEEE Trans Pattern Anal Mach Intell 45(2):2412–2429CrossRef
Metadata
Title
BejaGNN: behavior-based Java malware detection via graph neural network
Authors
Pengbin Feng
Li Yang
Di Lu
Ning Xi
Jianfeng Ma
Publication date
17-04-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 14/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05243-x

Other articles of this Issue 14/2023

The Journal of Supercomputing 14/2023 Go to the issue

Premium Partner