Skip navigation
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Publication Date
    • Author
    • Title
    • Subject
    • Department
  • Sign on to:
    • My MacSphere
    • Receive email
      updates
    • Edit Profile


McMaster University Home Page
  1. MacSphere
  2. Departments and Schools
  3. Faculty of Engineering
  4. Department of Mechanical Engineering
  5. Mechanical Engineering Publications
Please use this identifier to cite or link to this item: http://hdl.handle.net/11375/31308
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlsadi N-
dc.contributor.authorHilal W-
dc.contributor.authorSurucu O-
dc.contributor.authorGiuliano A-
dc.contributor.authorGadsden SA-
dc.contributor.authorYawney J-
dc.contributor.editorPham T-
dc.contributor.editorSolomon L-
dc.contributor.editorHohil ME-
dc.date.accessioned2025-03-03T17:25:51Z-
dc.date.available2025-03-03T17:25:51Z-
dc.date.issued2022-06-06-
dc.identifier.isbn978-1-5106-5102-9-
dc.identifier.issn0277-786X-
dc.identifier.issn1996-756X-
dc.identifier.urihttp://hdl.handle.net/11375/31308-
dc.description.abstractAmidst the extensive global integration of computer systems and augmented connectivity, there have been numerous difficulties within ensuring confidentiality, integrity and availability across all systems. Malware is an ever-present and persistent challenge for security systems of all sorts. Numerous malware detection methods have been proposed, with traditional approaches no longer providing the necessary protection against evolving attack methodologies and strategies. In recent years, machine learning for malware detection has been investigated with great success. In addition, the analysis of application operation code, or opcode, due to its unavoidable nature, can reveal necessary information about software intention. Visualization of opcode data allows for simple data augmentation and texture analysis. The proposed approach utilizes a simple visual attention module to perform a binary classification task on program data, focusing on visualized application opcode data. The proposed model is tested with an ARM-based Internet of Things (IoT) application opcode dataset. In addition, a comparative analysis, using numerous metrics, is conducted on the proposed model’s performance along with several other algorithms. The results indicate that the proposed method outperformed all other tested techniques in accuracy, recall, precision, and F-score.-
dc.publisherSPIE, the international society for optics and photonics-
dc.subject40 Engineering-
dc.subject4006 Communications Engineering-
dc.subject4009 Electronics, Sensors and Digital Hardware-
dc.subject51 Physical Sciences-
dc.subject5102 Atomic, Molecular and Optical Physics-
dc.subjectNetworking and Information Technology R&D (NITRD)-
dc.subjectMachine Learning and Artificial Intelligence-
dc.titleVisual attention for malware classification-
dc.typeArticle-
dc.date.updated2025-03-03T17:25:50Z-
dc.contributor.departmentMechanical Engineering-
dc.identifier.doihttps://doi.org/10.1117/12.2619009-
Appears in Collections:Mechanical Engineering Publications

Files in This Item:
File Description SizeFormat 
123-121131X.pdf
Open Access
Published version693.33 kBAdobe PDFView/Open
Show simple item record Statistics


Items in MacSphere are protected by copyright, with all rights reserved, unless otherwise indicated.

Sherman Centre for Digital Scholarship     McMaster University Libraries
©2022 McMaster University, 1280 Main Street West, Hamilton, Ontario L8S 4L8 | 905-525-9140 | Contact Us | Terms of Use & Privacy Policy | Feedback

Report Accessibility Issue