
Mostrar el registro sencillo del ítem
| dc.contributor.author | Bustos-Tabernero, Álvaro | |
| dc.contributor.author | López Sánchez, Daniel | |
| dc.contributor.author | González Arrieta, María Angélica | |
| dc.contributor.author | Novais, Paulo | |
| dc.date.accessioned | 2025-01-29T17:57:22Z | |
| dc.date.available | 2025-01-29T17:57:22Z | |
| dc.date.issued | 2024-09-05 | |
| dc.identifier.citation | Álvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González-Arrieta, Paulo Novais, Study of infostealers using Graph Neural Networks, Logic Journal of the IGPL, 2024;, jzae105, https://doi.org/10.1093/jigpal/jzae105 | es_ES |
| dc.identifier.issn | 1367-0751 | |
| dc.identifier.issn | 1368-9894 | |
| dc.identifier.uri | http://hdl.handle.net/10366/163133 | |
| dc.description.abstract | [EN]Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature recognition, logical rules or the identification of known malware stored in a database or public source. However, threat actors continuously try to create new variants of existing malware by obfuscating or altering parts of the code to evade detection by antivirus engines. Infostealers are one of the most common malicious programs aimed at obtaining personal or banking information from an infected system and exfiltrating it. In addition, they are the precursors of potentially high-security incidents because attackers gain a entry into companies’ internal systems and may even access them with administrator permissions. This article demonstrates how a feature vector can be obtained from the assembly code of a Windows binary and how a a Graph Neural Network can be used to determine, with ninety percent accuracy, whether it is an infostealer. | es_ES |
| dc.language.iso | eng | es_ES |
| dc.publisher | Oxford University Press | es_ES |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.subject | Cybersecurity | es_ES |
| dc.subject | Threat intelligence | es_ES |
| dc.subject | Deep learning | es_ES |
| dc.subject | Graph neural network | es_ES |
| dc.subject | Infostealer | es_ES |
| dc.title | Study of infostealers using Graph Neural Networks | es_ES |
| dc.type | info:eu-repo/semantics/article | es_ES |
| dc.relation.publishversion | https://doi.org/10.1093/jigpal/jzae105 | es_ES |
| dc.identifier.doi | 10.1093/jigpal/jzae105 | |
| dc.rights.accessRights | info:eu-repo/semantics/embargoedAccess | es_ES |
| dc.journal.title | Logic Journal of the IGPL | es_ES |
| dc.type.hasVersion | info:eu-repo/semantics/publishedVersion | es_ES |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
BISITE. Artículos [370]








