
Mostra i principali dati dell'item
| dc.contributor.author | Bustos-Tabernero, Álvaro | |
| dc.contributor.author | López Sánchez, Daniel | |
| dc.contributor.author | González Arrieta, María Angélica | |
| dc.contributor.author | Novais, Paulo | |
| dc.date.accessioned | 2025-01-29T17:57:22Z | |
| dc.date.available | 2025-01-29T17:57:22Z | |
| dc.date.issued | 2024-09-05 | |
| dc.identifier.citation | Álvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González-Arrieta, Paulo Novais, Study of infostealers using Graph Neural Networks, Logic Journal of the IGPL, 2024;, jzae105, https://doi.org/10.1093/jigpal/jzae105 | es_ES |
| dc.identifier.issn | 1367-0751 | |
| dc.identifier.issn | 1368-9894 | |
| dc.identifier.uri | http://hdl.handle.net/10366/163133 | |
| dc.description.abstract | [EN]Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature recognition, logical rules or the identification of known malware stored in a database or public source. However, threat actors continuously try to create new variants of existing malware by obfuscating or altering parts of the code to evade detection by antivirus engines. Infostealers are one of the most common malicious programs aimed at obtaining personal or banking information from an infected system and exfiltrating it. In addition, they are the precursors of potentially high-security incidents because attackers gain a entry into companies’ internal systems and may even access them with administrator permissions. This article demonstrates how a feature vector can be obtained from the assembly code of a Windows binary and how a a Graph Neural Network can be used to determine, with ninety percent accuracy, whether it is an infostealer. | es_ES |
| dc.language.iso | eng | es_ES |
| dc.publisher | Oxford University Press | es_ES |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.subject | Cybersecurity | es_ES |
| dc.subject | Threat intelligence | es_ES |
| dc.subject | Deep learning | es_ES |
| dc.subject | Graph neural network | es_ES |
| dc.subject | Infostealer | es_ES |
| dc.title | Study of infostealers using Graph Neural Networks | es_ES |
| dc.type | info:eu-repo/semantics/article | es_ES |
| dc.relation.publishversion | https://doi.org/10.1093/jigpal/jzae105 | es_ES |
| dc.identifier.doi | 10.1093/jigpal/jzae105 | |
| dc.rights.accessRights | info:eu-repo/semantics/embargoedAccess | es_ES |
| dc.journal.title | Logic Journal of the IGPL | es_ES |
| dc.type.hasVersion | info:eu-repo/semantics/publishedVersion | es_ES |
Files in questo item
Questo item appare nelle seguenti collezioni
-
BISITE. Artículos [370]








