Skip to main content

Showing 1–5 of 5 results for author: Chikkagoudar, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.02696  [pdf, other

    cs.CR cs.CV cs.HC cs.LG eess.IV eess.SP

    MalGrid: Visualization Of Binary Features In Large Malware Corpora

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: The number of malware is constantly on the rise. Though most new malware are modifications of existing ones, their sheer number is quite overwhelming. In this paper, we present a novel system to visualize and map millions of malware to points in a 2-dimensional (2D) spatial grid. This enables visualizing relationships within large malware datasets that can be used to develop triage solutions to sc… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: Submitted version - MILCOM 2022 IEEE Military Communications Conference. The high-quality images in this paper can be found on Github (https://github.com/Mayachitra-Inc/MalGrid)

  2. arXiv:2111.04710  [pdf, other

    cs.CR cs.CV cs.LG eess.SP

    OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features

    Authors: Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: With the growing number of malware and cyber attacks, there is a need for "orthogonal" cyber defense approaches, which are complementary to existing methods by detecting unique malware samples that are not predicted by other methods. In this paper, we propose a novel and orthogonal malware detection (OMD) approach to identify malware using a combination of audio descriptors, image similarity descr… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  3. arXiv:2111.04703  [pdf, other

    cs.CR cs.LG eess.SP

    HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Malicious PDF documents present a serious threat to various security organizations that require modern threat intelligence platforms to effectively analyze and characterize the identity and behavior of PDF malware. State-of-the-art approaches use machine learning (ML) to learn features that characterize PDF malware. However, ML models are often susceptible to evasion attacks, in which an adversary… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  4. arXiv:2101.10578  [pdf, other

    cs.CR cs.CV cs.LG

    Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: We propose a novel method to detect and visualize malware through image classification. The executable binaries are represented as grayscale images obtained from the count of N-grams (N=2) of bytes in the Discrete Cosine Transform (DCT) domain and a neural network is trained for malware detection. A shallow neural network is trained for classification, and its accuracy is compared with deep-networ… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: Submitted version - Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS) 2021

  5. A Formal Model For Real-Time Parallel Computation

    Authors: Peter Hui, Satish Chikkagoudar

    Abstract: The imposition of real-time constraints on a parallel computing environment- specifically high-performance, cluster-computing systems- introduces a variety of challenges with respect to the formal verification of the system's timing properties. In this paper, we briefly motivate the need for such a system, and we introduce an automaton-based method for performing such formal verification. We defi… ▽ More

    Submitted 31 December, 2012; originally announced January 2013.

    Comments: In Proceedings FTSCS 2012, arXiv:1212.6574

    ACM Class: D.2.4

    Journal ref: EPTCS 105, 2012, pp. 39-55