{"id":"https://openalex.org/W4400975448","doi":"https://doi.org/10.1109/tifs.2024.3433372","title":"Enhancing Malware Classification via Self-Similarity Techniques","display_name":"Enhancing Malware Classification via Self-Similarity Techniques","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400975448","doi":"https://doi.org/10.1109/tifs.2024.3433372"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3433372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3433372","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000182057","display_name":"Fangtian Zhong","orcid":"https://orcid.org/0000-0002-1125-7472"},"institutions":[{"id":"https://openalex.org/I23732399","display_name":"Montana State University","ror":"https://ror.org/02w0trx84","country_code":"US","type":"education","lineage":["https://openalex.org/I23732399","https://openalex.org/I4210126032"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fangtian Zhong","raw_affiliation_strings":["Gianforte School of Computing, Montana State University, Bozeman, MT, USA"],"affiliations":[{"raw_affiliation_string":"Gianforte School of Computing, Montana State University, Bozeman, MT, USA","institution_ids":["https://openalex.org/I23732399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073501368","display_name":"Qin Hu","orcid":"https://orcid.org/0000-0002-8847-8345"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qin Hu","raw_affiliation_strings":["Department of Computer Science, Georgia State University, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Georgia State University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049385418","display_name":"Yili Jiang","orcid":"https://orcid.org/0000-0003-0340-1152"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yili Jiang","raw_affiliation_strings":["Department of Computer Science, Georgia State University, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Georgia State University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052507995","display_name":"Jiaqi Huang","orcid":"https://orcid.org/0000-0002-9794-2103"},"institutions":[{"id":"https://openalex.org/I28324025","display_name":"University of Central Missouri","ror":"https://ror.org/02c63wv67","country_code":"US","type":"education","lineage":["https://openalex.org/I28324025"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiaqi Huang","raw_affiliation_strings":["Department of Computer Science and Cybersecurity, University of Central Missouri, Warrensburg, MO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Cybersecurity, University of Central Missouri, Warrensburg, MO, USA","institution_ids":["https://openalex.org/I28324025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100439655","display_name":"Cheng Zhang","orcid":"https://orcid.org/0000-0002-7196-9463"},"institutions":[{"id":"https://openalex.org/I188674872","display_name":"West Texas A&M University","ror":"https://ror.org/04gnp7x40","country_code":"US","type":"education","lineage":["https://openalex.org/I188674872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cheng Zhang","raw_affiliation_strings":["Department of Computer Information and Decision Management, West Texas A&#x0026;M University, Canyon, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Information and Decision Management, West Texas A&#x0026;M University, Canyon, TX, USA","institution_ids":["https://openalex.org/I188674872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008435786","display_name":"Dinghao Wu","orcid":"https://orcid.org/0000-0002-0741-5511"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinghao Wu","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5000182057"],"corresponding_institution_ids":["https://openalex.org/I23732399"],"apc_list":null,"apc_paid":null,"fwci":4.002,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94651445,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"7232","last_page":"7244"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.972000002861023,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8238615989685059},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7526142597198486},{"id":"https://openalex.org/keywords/self-similarity","display_name":"Self-similarity","score":0.5542826652526855},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5092421770095825},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4633062481880188},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3964174687862396},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.38291025161743164},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23677515983581543},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0952807068824768}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8238615989685059},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7526142597198486},{"id":"https://openalex.org/C119453123","wikidata":"https://www.wikidata.org/wiki/Q262372","display_name":"Self-similarity","level":2,"score":0.5542826652526855},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5092421770095825},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4633062481880188},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3964174687862396},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38291025161743164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23677515983581543},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0952807068824768},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3433372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3433372","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311310","display_name":"Montana State University","ror":"https://ror.org/02w0trx84"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1544837488","https://openalex.org/W1566135517","https://openalex.org/W1893133781","https://openalex.org/W2010065958","https://openalex.org/W2057175746","https://openalex.org/W2091088253","https://openalex.org/W2128554449","https://openalex.org/W2275378310","https://openalex.org/W2466114212","https://openalex.org/W2514974017","https://openalex.org/W2704360550","https://openalex.org/W2765653036","https://openalex.org/W2766733482","https://openalex.org/W2796394805","https://openalex.org/W2908835234","https://openalex.org/W2912095101","https://openalex.org/W2945020349","https://openalex.org/W2963562762","https://openalex.org/W2981091784","https://openalex.org/W2990954041","https://openalex.org/W2998906013","https://openalex.org/W3004280948","https://openalex.org/W3005410693","https://openalex.org/W3008497156","https://openalex.org/W3101040922","https://openalex.org/W3129333334","https://openalex.org/W3189794512","https://openalex.org/W4313200615","https://openalex.org/W4316013375","https://openalex.org/W4383753794","https://openalex.org/W4384129390","https://openalex.org/W4384345699","https://openalex.org/W4388858920","https://openalex.org/W4388867297","https://openalex.org/W4391558398","https://openalex.org/W6632780167","https://openalex.org/W6637373629","https://openalex.org/W6724342392","https://openalex.org/W6743686110","https://openalex.org/W6753073829","https://openalex.org/W6850283204"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453","https://openalex.org/W3152891574","https://openalex.org/W2379232404"],"abstract_inverted_index":{"Despite":[0],"continuous":[1],"advancements":[2],"in":[3,17],"defense":[4],"mechanisms,":[5],"attackers":[6],"often":[7,68],"find":[8],"ways":[9],"to":[10,22,46,70,90,110,133,141],"circumvent":[11],"security":[12],"measures.":[13],"Windows":[14,48],"operating":[15],"systems,":[16],"particular,":[18],"are":[19],"vulnerable":[20],"due":[21],"fewer":[23],"restrictions":[24],"on":[25,43,164,199],"downloading":[26],"software":[27],"from":[28],"unknown":[29],"sources,":[30],"facilitating":[31,153],"the":[32,72,96,117,145,187,228],"spread":[33],"of":[34,75,119,147,180,189,197,222,230],"malware.":[35],"To":[36],"address":[37],"this":[38],"challenge,":[39],"researchers":[40],"have":[41],"focused":[42],"developing":[44],"techniques":[45,109],"identify":[47],"malware,":[49,172],"crucial":[50],"for":[51,102,237,247],"mitigating":[52],"potential":[53],"damage.":[54],"Traditional":[55],"approaches":[56],"typically":[57],"categorize":[58],"threats":[59],"into":[60,150],"broad":[61],"classes":[62],"such":[63],"as":[64],"trojans":[65],"or":[66],"adware,":[67],"failing":[69],"capture":[71,134],"full":[73],"spectrum":[74],"malicious":[76],"behaviors":[77],"exhibited":[78],"by":[79,219],"diverse":[80],"malware":[81,91,98,120,148,181,239,249],"variants.":[82],"In":[83],"response,":[84],"we":[85],"propose":[86],"a":[87,130,200,220,244],"novel":[88],"approach":[89,143,243],"categorization":[92],"that":[93],"incorporates":[94],"both":[95],"general":[97],"family":[99],"and":[100,114,167,233,251],"subfamily":[101],"each":[103],"sample.":[104],"Our":[105,183],"method":[106,174,210],"leverages":[107],"self-similarity":[108,151],"extract":[111],"local":[112,165],"semantics":[113,159],"similarities":[115],"within":[116,160,235],"blocks":[118,236],"binaries":[121,149],"while":[122,156],"preserving":[123],"correlations":[124,234],"between":[125],"these":[126,135],"blocks.":[127,161],"We":[128],"utilize":[129],"VGG11":[131],"model":[132],"features,":[136],"enabling":[137],"accurate":[138],"classification.":[139],"Central":[140],"our":[142,173,190,209,242],"is":[144],"conversion":[146],"descriptors,":[152],"space":[154,213],"savings":[155],"capturing":[157],"essential":[158],"By":[162],"focusing":[163],"self-similarities":[166,232],"their":[168],"geometric":[169],"layouts":[170],"across":[171],"effectively":[175],"identifies":[176],"repetitive":[177],"patterns":[178],"indicative":[179],"behavior.":[182],"proof-of-concept":[184],"implementation":[185],"demonstrates":[186],"effectiveness":[188],"framework,":[191],"achieving":[192],"an":[193],"impressive":[194],"average":[195],"precision":[196],"98.2%":[198],"newly":[201],"gathered":[202],"dataset":[203],"with":[204],"over":[205,223],"25,000":[206],"samples.":[207],"Moreover,":[208],"offers":[211],"significant":[212],"savings,":[214],"outperforming":[215],"recent":[216],"research":[217],"efforts":[218],"factor":[221],"96.":[224],"These":[225],"results":[226],"underscore":[227],"efficacy":[229],"incorporating":[231],"robust":[238],"classification,":[240],"making":[241],"promising":[245],"solution":[246],"real-world":[248],"detection":[250],"prevention.":[252]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
