Devising Malware Characterstics using Transformers

05/23/2020
by   Simra Shahid, et al.
0

With the increasing number of cybersecurity threats, it becomes more difficult for researchers to skim through the security reports for malware analysis. There is a need to be able to extract highly relevant sentences without having to read through the entire malware reports. In this paper, we are finding relevant malware behavior mentions from Advanced Persistent Threat Reports. This main contribution is an opening attempt to Transformer the approach for malware behavior analysis.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset