| dc.contributor.author | Bustos-Tabernero, Álvaro | |
| dc.contributor.author | López Sánchez, Daniel | |
| dc.contributor.author | González Arrieta, María Angélica | |
| dc.contributor.author | Novais, Paulo | |
| dc.date.accessioned | 2025-01-29T17:57:22Z | |
| dc.date.available | 2025-01-29T17:57:22Z | |
| dc.date.issued | 2024-09-05 | |
| dc.identifier.citation | Álvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González-Arrieta, Paulo Novais, Study of infostealers using Graph Neural Networks, Logic Journal of the IGPL, 2024;, jzae105, https://doi.org/10.1093/jigpal/jzae105 | es_ES |
| dc.identifier.issn | 1367-0751 | |
| dc.identifier.issn | 1368-9894 | |
| dc.identifier.uri | http://hdl.handle.net/10366/163133 | |
| dc.description.abstract | [EN]Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature
recognition, logical rules or the identification of known malware stored in a database or public source. However, threat
actors continuously try to create new variants of existing malware by obfuscating or altering parts of the code to evade
detection by antivirus engines. Infostealers are one of the most common malicious programs aimed at obtaining
personal or banking information from an infected system and exfiltrating it. In addition, they are the precursors of
potentially high-security incidents because attackers gain a entry into companies’ internal systems and may even access
them with administrator permissions. This article demonstrates how a feature vector can be obtained from the
assembly code of a Windows binary and how a a Graph Neural Network can be used to determine, with ninety percent
accuracy, whether it is an infostealer. | es_ES |
| dc.language.iso | eng | es_ES |
| dc.publisher | Oxford University Press | es_ES |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.subject | Cybersecurity | es_ES |
| dc.subject | Threat intelligence | es_ES |
| dc.subject | Deep learning | es_ES |
| dc.subject | Graph neural network | es_ES |
| dc.subject | Infostealer | es_ES |
| dc.title | Study of infostealers using Graph Neural Networks | es_ES |
| dc.type | info:eu-repo/semantics/article | es_ES |
| dc.relation.publishversion | https://doi.org/10.1093/jigpal/jzae105 | es_ES |
| dc.identifier.doi | 10.1093/jigpal/jzae105 | |
| dc.rights.accessRights | info:eu-repo/semantics/embargoedAccess | es_ES |
| dc.journal.title | Logic Journal of the IGPL | es_ES |
| dc.type.hasVersion | info:eu-repo/semantics/publishedVersion | es_ES |