Cross-platform malicious code detection method and system
A malicious code detection, cross-platform technology, applied in the field of software security technology protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] A cross-platform malicious code detection method, comprising the following steps:
[0060] (1) Using large-scale benign program samples on multiple platforms, train a pre-training model (Pre-trainModel) to capture the structure and semantic correlation in the program instruction context and the structure and semantic commonality between program instructions on different platforms;
[0061] (2) On top of the pre-training model, a cross-platform malicious code detection model is constructed using limited-scale benign program samples and malicious program samples from multiple platforms, fine-tuning the parameters of the cross-platform malicious code detection model, and incorporating the knowledge Migrate to a cross-platform malicious code detection model;
[0062] (3) Use the constructed cross-platform malicious code detection model to detect unknown program samples on different platforms (including platforms not involved in pre-training and detection model training), an...
Embodiment 2
[0065] According to a kind of cross-platform malicious code detection method described in embodiment 1, such as figure 2 As shown, the difference is:
[0066] The specific implementation process of step (1) is as follows:
[0067] 1.1: Collect large-scale benign program samples on Windows, Andriod, Linux, and localization platforms, and construct a multi-platform benign program data set D, where samples in D are denoted as U i =[C i ,W i ]; where C i ={C 1 ,C 2 ,...,C n} represents the program instructions of the i-th sample, the set C i The subscript n represents the total number of program instructions (token); W i ={W 1 ,W 2 ,...,W m} denote annotations of the i-th sample, set W i The subscript m represents the total number of annotation words;
[0068] 1.2: If image 3 As shown, the pre-training model M is constructed based on the multi-layer Transformer encoder, and the pre-training model M is pre-trained using the multi-platform benign program dataset D; a...
Embodiment 3
[0083] According to a kind of cross-platform malicious code detection method described in embodiment 2, its difference is:
[0084] like Figure 4 As shown, the specific implementation process of step (2) is as follows:
[0085] 2.1: Build a malicious code detection model M' on the pre-training model M, and the malicious code detection model M' includes a pre-training model M and a linear classifier K;
[0086] The architecture of the malicious code detection model M' is to connect a linear classifier K to the pre-trained model M. The architecture of the malicious code detection model M' is as follows: Image 6 shown.
[0087] 2.2: In order to better learn the structural and semantic features of malicious codes on different platforms, construct a data set D' and train the malicious code detection model M'. The data set D' includes malicious code samples and benign codes from various platforms sample. In order to prevent the malicious code detection model M' from being bias...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


