Devising Malware Characterstics using Transformers
2020-05-23Unverified0· sign in to hype
Simra Shahid, Tanmay Singh, Yash Sharma, Kapil Sharma
Unverified — Be the first to reproduce this paper.
ReproduceAbstract
With the increasing number of cybersecurity threats, it becomes more difficult for researchers to skim through the security reports for malware analysis. There is a need to be able to extract highly relevant sentences without having to read through the entire malware reports. In this paper, we are finding relevant malware behavior mentions from Advanced Persistent Threat Reports. This main contribution is an opening attempt to Transformer the approach for malware behavior analysis.