MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics

Published: 01 Jan 2019, Last Modified: 13 May 2024Comput. Secur. 2019EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: Highlights•Explore the difference and relation between the dynamic and static API call sequences by defining a number of types of malicious behaviors.•Build a malware detection framework called MalDAE based on correlation and fusion of dynamic and static API call sequences.•Provide an explainable theoretical framework for malware detection based on fusion of dynamic and static API call information.•Conduct comprehensive experiments and a detailed comparison with similar studies to evaluate MalDAE.
Loading