Microsoft and Intel are turning malware into images
Project STAMINA uses deep learning to detect and classify malware
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Researchers from theMicrosoftThreat Protection Intelligence Team andIntelLabs have come together to work on a new research project that utilized a novel approach to detect and classifymalware.
The project, called STAtic Malware-as-Image Network Analysis (STAMINA), used a new technique to convert malware samples into grayscale images which were then scanned for textural and structural patterns specific to known malware samples.
During the first part of their collaboration, the researchers built on Intel’s previous work on deep transfer learning for static malware classification and used a real-world dataset from Microsoft to better understand the practical value of approaching malware classification as a computer vision task.
The STAMINA approach makes the argument that malware can be classified at scale by performing static analysis on malware codes represented as images.
Turning malware into images
The researchers first prepared the malware binaries by converting them into two-dimensional images using pixel conversion, reshaping and resizing. The binaries were then converted into a one-dimensional pixel stream by assigning each byte a value between 0 and 255 which corresponded to pixel intensity. Each Pixel stream was then transformed into a two-dimensional image by using the file size to determine the width and height of each image.
These resized images were then fed into a pre-traineddeep neural network(DNN) that scanned the 2D representations of malware strains and classified them as either clean or infected. To serve as a base for the research, Microsoft provided a sample of 2.2m infected Portable Executable (PE) file hashes.
Microsoft and Intel researchers used 60 percent of the known malware samples to train the original DNN algorithm, 20 percent of the files were used to validate the DNN and the other 20 percent were used for the actual testing process. According to the research team, STAMINA was able to achieve an accuracy rate of 99.07 percent in identifying and classifyingmalware sampleswith a false positive rate of only 2.58 percent. When working with smaller files, STAMINA was accurate and fast though the project wavered when working with larger images.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Based on the project’s success at identifying malware, Microsoft could one day end up using STAMINA to spot malware on Windows PCs or even in its antivirus softwareWindow Defender.
ViaZDNet
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.
Washington state court systems taken offline following cyberattack
Is it still worth using Proton VPN Free?
Get the Fitbit Versa 4 for a record-low price at Amazon ahead of Black Friday