Skip navigation
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Publication Date
    • Author
    • Title
    • Subject
    • Department
  • Sign on to:
    • My MacSphere
    • Receive email
      updates
    • Edit Profile


McMaster University Home Page
  1. MacSphere
  2. Departments and Schools
  3. Faculty of Engineering
  4. Department of Mechanical Engineering
  5. Mechanical Engineering Publications
Please use this identifier to cite or link to this item: http://hdl.handle.net/11375/31371
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHilal W-
dc.contributor.authorWilkinson C-
dc.contributor.authorAlsadi N-
dc.contributor.authorSurucu O-
dc.contributor.authorGiuliano A-
dc.contributor.authorGadsden SA-
dc.contributor.authorYawney J-
dc.contributor.editorBlowers M-
dc.contributor.editorHall RD-
dc.contributor.editorDasari VR-
dc.date.accessioned2025-03-03T23:37:58Z-
dc.date.available2025-03-03T23:37:58Z-
dc.date.issued2022-05-30-
dc.identifier.isbn978-1-5106-5110-4-
dc.identifier.issn0277-786X-
dc.identifier.issn1996-756X-
dc.identifier.urihttp://hdl.handle.net/11375/31371-
dc.description.abstractMalware is a term that refers to any malicious software used to harm or exploit a device, service, or network. The presence of malware in a system can disrupt operations and the availability of information in networks while also jeopardizing the integrity and confidentiality of such information, which poses a grave issue for sensitive and critical operations. Traditional approaches to malware detection often used by antivirus software are not robust in detecting previously unseen malware. As a result, they can often be circumvented by finding and exploiting vulnerabilities of the detection system. This study involves using natural language processing techniques, considering the recent advancements made in the field in recent years, to analyze the strings present in the executable files of malware. Specifically, we propose a topic modeling-based approach whereby the strings of a malware's executable file are treated as a language abstraction to extract relevant topics, which can then be used to improve a classifier's detection performance. Finally, through experiments using a publicly available dataset, the proposed approach is demonstrated to be superior in performance to traditional techniques in its detection ability, specifically in terms of performance measures such as precision and accuracy.-
dc.publisherSPIE, the international society for optics and photonics-
dc.subject40 Engineering-
dc.subject4006 Communications Engineering-
dc.subject4009 Electronics, Sensors and Digital Hardware-
dc.subject51 Physical Sciences-
dc.subject5102 Atomic, Molecular and Optical Physics-
dc.titleA topic modeling-based approach to executable file malware detection-
dc.typeArticle-
dc.date.updated2025-03-03T23:37:50Z-
dc.contributor.departmentMechanical Engineering-
dc.identifier.doihttps://doi.org/10.1117/12.2619033-
Appears in Collections:Mechanical Engineering Publications

Files in This Item:
File Description SizeFormat 
118-1211708.pdf
Open Access
Published version373.05 kBAdobe PDFView/Open
Show simple item record Statistics


Items in MacSphere are protected by copyright, with all rights reserved, unless otherwise indicated.

Sherman Centre for Digital Scholarship     McMaster University Libraries
©2022 McMaster University, 1280 Main Street West, Hamilton, Ontario L8S 4L8 | 905-525-9140 | Contact Us | Terms of Use & Privacy Policy | Feedback

Report Accessibility Issue