{"id":"https://openalex.org/W4412593934","doi":"https://doi.org/10.32604/cmc.2025.067636","title":"MemHookNet: Real-Time Multi-Class Heap Anomaly Detection with Log Hooking","display_name":"MemHookNet: Real-Time Multi-Class Heap Anomaly Detection with Log Hooking","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412593934","doi":"https://doi.org/10.32604/cmc.2025.067636"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067636","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067636","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067636","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100640778","display_name":"Siyi Wang","orcid":"https://orcid.org/0000-0003-0304-9398"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Siyi Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102766517","display_name":"Yan Zhuang","orcid":"https://orcid.org/0000-0002-5449-024X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yan Zhuang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zhizhuang Zhou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhizhuang Zhou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100772594","display_name":"Xinhao Wang","orcid":"https://orcid.org/0000-0002-0366-7543"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinhao Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5014100971","display_name":"Menglan Li","orcid":"https://orcid.org/0000-0001-9312-3111"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Menglan Li","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100640778"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08554475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"2","first_page":"3041","last_page":"3066"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11941","display_name":"Power System Reliability and Maintenance","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.846207857131958},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5329552292823792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5324692726135254},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.25837773084640503},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20359742641448975}],"concepts":[{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.846207857131958},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5329552292823792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5324692726135254},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25837773084640503},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20359742641448975}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067636","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067636","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067636","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067636","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W3097868972","https://openalex.org/W3187841728","https://openalex.org/W3198381997","https://openalex.org/W4224215031","https://openalex.org/W4312056381","https://openalex.org/W4319870932","https://openalex.org/W4392240693","https://openalex.org/W4401328698","https://openalex.org/W4402056503"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3158777280","https://openalex.org/W2949158926","https://openalex.org/W2093687902","https://openalex.org/W4301885003","https://openalex.org/W4387561287","https://openalex.org/W1996981508","https://openalex.org/W1989205740"],"abstract_inverted_index":{"Heap":[0],"memory":[1,66,84],"anomalies,":[2],"such":[3],"as":[4],"Use-After-Free":[5],"(UAF),":[6],"Double-Free,":[7],"and":[8,20,32,71,86,123,136,142],"Memory":[9,93],"Leaks,":[10],"pose":[11],"critical":[12],"security":[13],"threats":[14],"including":[15],"system":[16],"crashes,":[17],"data":[18],"leakage,":[19],"remote":[21],"exploits.":[22],"Existing":[23],"methods":[24],"often":[25],"fail":[26],"to":[27],"handle":[28],"multiple":[29],"anomaly":[30,49],"types":[31],"meet":[33],"real-time":[34,46],"detection":[35,50],"demands.":[36],"To":[37],"address":[38],"these":[39],"challenges,":[40],"this":[41],"paper":[42],"proposes":[43],"MemHookNet,":[44],"a":[45,112],"multi-class":[47],"heap":[48],"framework":[51],"that":[52,118],"combines":[53],"log":[54],"hooking":[55],"with":[56,126],"deep":[57],"learning.":[58],"Without":[59],"modifying":[60],"source":[61],"code,":[62],"MemHookNet":[63,119],"non-intrusively":[64],"captures":[65],"operation":[67,78],"logs":[68],"at":[69],"runtime":[70],"transforms":[72],"them":[73],"into":[74,105],"structured":[75],"sequences":[76],"encoding":[77],"types,":[79],"pointer":[80,106],"identifiers,":[81],"thread":[82],"context,":[83],"sizes,":[85],"temporal":[87],"intervals.":[88],"A":[89],"sliding-window":[90],"Long":[91],"Short-Term":[92],"(LSTM)":[94],"module":[95],"efficiently":[96],"filters":[97],"out":[98],"suspicious":[99],"segments,":[100],"which":[101],"are":[102],"then":[103],"transformed":[104],"access":[107],"graphs":[108],"for":[109],"classification":[110],"using":[111],"GATv2-based":[113],"model.":[114],"Experimental":[115],"results":[116],"demonstrate":[117],"achieves":[120],"82.2%":[121],"accuracy":[122,141],"81.5%":[124],"recall":[125],"an":[127],"average":[128],"inference":[129],"time":[130],"of":[131],"15":[132],"ms,":[133],"outperforming":[134],"DeepLog":[135],"GLAD-PAW":[137],"by":[138,145],"11.7%":[139],"in":[140],"reducing":[143],"latency":[144],"over":[146],"80%.":[147]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
