SOTAVerified

Devising Malware Characterstics using Transformers

2020-05-23Unverified0· sign in to hype

Simra Shahid, Tanmay Singh, Yash Sharma, Kapil Sharma

Unverified — Be the first to reproduce this paper.

Reproduce

Abstract

With the increasing number of cybersecurity threats, it becomes more difficult for researchers to skim through the security reports for malware analysis. There is a need to be able to extract highly relevant sentences without having to read through the entire malware reports. In this paper, we are finding relevant malware behavior mentions from Advanced Persistent Threat Reports. This main contribution is an opening attempt to Transformer the approach for malware behavior analysis.

Tasks

Reproductions