期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An Information Hiding Algorithm Based on Bitmap Resource of Portable Executable File 被引量:2
1
作者 Jie Xu Li-Jun Feng Ya-Lan Ye Yue Wu 《Journal of Electronic Science and Technology》 CAS 2012年第2期181-184,共4页
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some trad... An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 展开更多
关键词 Bitmap resources data embedding information hiding portable executable file.
下载PDF
Impact of Portable Executable Header Features on Malware Detection Accuracy
2
作者 Hasan H.Al-Khshali Muhammad Ilyas 《Computers, Materials & Continua》 SCIE EI 2023年第1期153-178,共26页
One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious... One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained. 展开更多
关键词 AI driven cybersecurity artificial intelligence CYBERSECURITY Decision Tree Neural Network Multi-Layer Perceptron Classifier portable executable(PE)file header features
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部