SlideShare a Scribd company logo
Study of Appropriate Information Combination in
Image-based Obfuscated Malware Detection
The 55th Annual IEEE/IFIP International Conference
on Dependable Systems and Networks
Poster Track
Tetsuro Takahashi | DSN2025 | 2025.6.24
Shizuoka Unviersity, Ohki Laboratory
1 of 11
Tetsuro Takahashi*, Rikima Mitsuhashi*,
Masakatsu Nishigaki*, Tetsushi Ohki*
*Shizuoka University
Background | Malware Obfuscation
Malware uses obfuscation to evade
malware detection
Obfuscation modifies malware
signature through various techniques
• packing, encryption, etc.
Due to obfuscation,
the difficulty of detecting
malware signatures has increased
2 of 11
before after
Project Page
Background | Image-Based Malware Detection
To tackle obfuscation, image-based malware detection
has been proposed
• Byte value, Entropy, etc.
Existing methods have two limitations:
• Remain limited by single information modalities
• Overlook benign file obfuscation in realistic environments
3 of 11
Key Questions in Our Study
• How effective is image-based malware detection in
environments with diverse obfuscation techniques?
• How does combining different types of information affect
malware detection performance?
4 of 11
Contributions
• We constructed a dataset that includes both obfuscated
and non-obfuscated benign files and malware, reflecting
realistic environments.
• We evaluated an image-based method that integrates
four types of information, demonstrating that information
fusion improves malware detection performance to as
high as 88.66%.
5 of 11
Proposed Method | Image Conversion
• Executable PE files are converted
into images representing four
types of information:
• Byte value
• Entropy
• Semantic information
• Bigram frequency
6 of 11
Image Conversion Overview
Proposed Method | Malware Detection
We extract high-level features
from each type of image
The extracted features are
concatenated and fed into a
binary classifier
• Feature Extractor: EfficientNet-B0
• Binary Classifier: Random Forest
7 of 11
Malware Detection Framework
Evaluation | Dataset
Dataset Sources:
• Benign file
➢ DikeDataset
➢ dataset of packed PE files
• Malware
➢ VirusShare
Applied five tools of Obfuscation:
• PECompact
• PEtite
• Themida
• UPX
8 of 11
Dataset Configuration
Evaluation | Result
• Accuracy of Single information
Byte = Semantic > Entropy = BiGram
• Combining all four information
types achieved 88.66% accuracy
• Combining Semantic infomation
with other information (B,S・S,G)
tends to increase specificity
9 of 11
Result
Evaluation | Discussion
• Combining Semantic infomation
with other information (B,S・S,G)
tends to increase specificity
Semantic information is
• highly independent as a feature
• improves specificity
when combined with other types
10 of 11
Result
Future Work
• We plan to explore more effective combinations by
incorporating a wider variety of information.
• This study considers only a limited set of obfuscation
techniques. Future work should evaluate the proposed
method using a broader range of techniques.
11 of 11

More Related Content

PPTX
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
PDF
Data Mining Techniques for Providing Network Security through Intrusion Detec...
PPTX
International collaborative efforts to share threat data in a vetted member c...
PPTX
A semantic framework for biomedical image discovery
PDF
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
PDF
Secure data management, analysis, infrastructure and policy in an internation...
PDF
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
Data Mining Techniques for Providing Network Security through Intrusion Detec...
International collaborative efforts to share threat data in a vetted member c...
A semantic framework for biomedical image discovery
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
Secure data management, analysis, infrastructure and policy in an internation...
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...

Similar to Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection (20)

PDF
Presentation of the InVID tools for image forensics analysis
PPTX
Next Generation Internet
PDF
A systematic review of network analyst - Pubrica
PDF
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
PDF
Data mining in security: Ja'far Alqatawna
PPTX
TEAM.MAJOR[1] project based on the .pptx
PDF
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
PPTX
ICMCSI 2023 PPT 1074.pptx
PDF
Bioinformatics and sequencing tools used in research and development - OECD B...
PDF
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
PDF
Zero day malware detection
PPT
computer forensicsPPT4-SESI4-20220406071621.ppt
PDF
Open Source Security for Newbies - Best Practices
PPTX
LAS - System Biology Lesson
PPTX
Malware Detection Approaches using Data Mining Techniques.pptx
PPTX
Bioinformatics Gaussian by ChARM’s
PDF
Toward revealing Advanced Persistence Threats in your organization - Public
DOC
Lei_Resume-it.doc
PPTX
Role of Biometric in Reducing the Size of Big Data
PDF
Acquisition of malicious code using active learning
Presentation of the InVID tools for image forensics analysis
Next Generation Internet
A systematic review of network analyst - Pubrica
An In-Depth Benchmarking And Evaluation Of Phishing Detection Research For Se...
Data mining in security: Ja'far Alqatawna
TEAM.MAJOR[1] project based on the .pptx
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
ICMCSI 2023 PPT 1074.pptx
Bioinformatics and sequencing tools used in research and development - OECD B...
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
Zero day malware detection
computer forensicsPPT4-SESI4-20220406071621.ppt
Open Source Security for Newbies - Best Practices
LAS - System Biology Lesson
Malware Detection Approaches using Data Mining Techniques.pptx
Bioinformatics Gaussian by ChARM’s
Toward revealing Advanced Persistence Threats in your organization - Public
Lei_Resume-it.doc
Role of Biometric in Reducing the Size of Big Data
Acquisition of malicious code using active learning
Ad

Recently uploaded (20)

PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PPT
protein biochemistry.ppt for university classes
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PPTX
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PPTX
2. Earth - The Living Planet earth and life
PPTX
2Systematics of Living Organisms t-.pptx
PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PPTX
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
PPT
POSITIONING IN OPERATION THEATRE ROOM.ppt
PDF
An interstellar mission to test astrophysical black holes
PDF
lecture 2026 of Sjogren's syndrome l .pdf
PPTX
INTRODUCTION TO EVS | Concept of sustainability
PDF
. Radiology Case Scenariosssssssssssssss
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PDF
Lymphatic System MCQs & Practice Quiz – Functions, Organs, Nodes, Ducts
PPTX
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
PPTX
Introduction to Cardiovascular system_structure and functions-1
PDF
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
Classification Systems_TAXONOMY_SCIENCE8.pptx
protein biochemistry.ppt for university classes
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
2. Earth - The Living Planet earth and life
2Systematics of Living Organisms t-.pptx
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
POSITIONING IN OPERATION THEATRE ROOM.ppt
An interstellar mission to test astrophysical black holes
lecture 2026 of Sjogren's syndrome l .pdf
INTRODUCTION TO EVS | Concept of sustainability
. Radiology Case Scenariosssssssssssssss
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
The KM-GBF monitoring framework – status & key messages.pptx
Lymphatic System MCQs & Practice Quiz – Functions, Organs, Nodes, Ducts
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
Introduction to Cardiovascular system_structure and functions-1
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
Ad

Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection

  • 1. Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection The 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Poster Track Tetsuro Takahashi | DSN2025 | 2025.6.24 Shizuoka Unviersity, Ohki Laboratory 1 of 11 Tetsuro Takahashi*, Rikima Mitsuhashi*, Masakatsu Nishigaki*, Tetsushi Ohki* *Shizuoka University
  • 2. Background | Malware Obfuscation Malware uses obfuscation to evade malware detection Obfuscation modifies malware signature through various techniques • packing, encryption, etc. Due to obfuscation, the difficulty of detecting malware signatures has increased 2 of 11 before after Project Page
  • 3. Background | Image-Based Malware Detection To tackle obfuscation, image-based malware detection has been proposed • Byte value, Entropy, etc. Existing methods have two limitations: • Remain limited by single information modalities • Overlook benign file obfuscation in realistic environments 3 of 11
  • 4. Key Questions in Our Study • How effective is image-based malware detection in environments with diverse obfuscation techniques? • How does combining different types of information affect malware detection performance? 4 of 11
  • 5. Contributions • We constructed a dataset that includes both obfuscated and non-obfuscated benign files and malware, reflecting realistic environments. • We evaluated an image-based method that integrates four types of information, demonstrating that information fusion improves malware detection performance to as high as 88.66%. 5 of 11
  • 6. Proposed Method | Image Conversion • Executable PE files are converted into images representing four types of information: • Byte value • Entropy • Semantic information • Bigram frequency 6 of 11 Image Conversion Overview
  • 7. Proposed Method | Malware Detection We extract high-level features from each type of image The extracted features are concatenated and fed into a binary classifier • Feature Extractor: EfficientNet-B0 • Binary Classifier: Random Forest 7 of 11 Malware Detection Framework
  • 8. Evaluation | Dataset Dataset Sources: • Benign file ➢ DikeDataset ➢ dataset of packed PE files • Malware ➢ VirusShare Applied five tools of Obfuscation: • PECompact • PEtite • Themida • UPX 8 of 11 Dataset Configuration
  • 9. Evaluation | Result • Accuracy of Single information Byte = Semantic > Entropy = BiGram • Combining all four information types achieved 88.66% accuracy • Combining Semantic infomation with other information (B,S・S,G) tends to increase specificity 9 of 11 Result
  • 10. Evaluation | Discussion • Combining Semantic infomation with other information (B,S・S,G) tends to increase specificity Semantic information is • highly independent as a feature • improves specificity when combined with other types 10 of 11 Result
  • 11. Future Work • We plan to explore more effective combinations by incorporating a wider variety of information. • This study considers only a limited set of obfuscation techniques. Future work should evaluate the proposed method using a broader range of techniques. 11 of 11