Afficher la notice abrégée

dc.contributor.authorBustos-Tabernero, Álvaro
dc.contributor.authorLópez Sánchez, Daniel 
dc.contributor.authorGonzález Arrieta, María Angélica 
dc.contributor.authorNovais, Paulo
dc.date.accessioned2025-01-29T17:57:22Z
dc.date.available2025-01-29T17:57:22Z
dc.date.issued2024-09-05
dc.identifier.citationÁlvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González-Arrieta, Paulo Novais, Study of infostealers using Graph Neural Networks, Logic Journal of the IGPL, 2024;, jzae105, https://doi.org/10.1093/jigpal/jzae105es_ES
dc.identifier.issn1367-0751
dc.identifier.issn1368-9894
dc.identifier.urihttp://hdl.handle.net/10366/163133
dc.description.abstract[EN]Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature recognition, logical rules or the identification of known malware stored in a database or public source. However, threat actors continuously try to create new variants of existing malware by obfuscating or altering parts of the code to evade detection by antivirus engines. Infostealers are one of the most common malicious programs aimed at obtaining personal or banking information from an infected system and exfiltrating it. In addition, they are the precursors of potentially high-security incidents because attackers gain a entry into companies’ internal systems and may even access them with administrator permissions. This article demonstrates how a feature vector can be obtained from the assembly code of a Windows binary and how a a Graph Neural Network can be used to determine, with ninety percent accuracy, whether it is an infostealer.es_ES
dc.language.isoenges_ES
dc.publisherOxford University Presses_ES
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectCybersecurityes_ES
dc.subjectThreat intelligencees_ES
dc.subjectDeep learninges_ES
dc.subjectGraph neural networkes_ES
dc.subjectInfostealeres_ES
dc.titleStudy of infostealers using Graph Neural Networkses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.relation.publishversionhttps://doi.org/10.1093/jigpal/jzae105es_ES
dc.identifier.doi10.1093/jigpal/jzae105
dc.rights.accessRightsinfo:eu-repo/semantics/embargoedAccesses_ES
dc.journal.titleLogic Journal of the IGPLes_ES
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersiones_ES


Fichier(s) constituant ce document

Thumbnail

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepté là où spécifié autrement, la license de ce document est décrite en tant que Attribution-NonCommercial-NoDerivatives 4.0 Internacional