Yoneda et al., 2025 - Google Patents
Kernel-Level Malware Analysis and Behavioral Explanation Using LLMsYoneda et al., 2025
View PDF- Document ID
 - 6213255393876284154
 - Author
 - Yoneda N
 - Hatano R
 - Nishiyama H
 - Publication year
 - Publication venue
 - International Conference on Agents and Artificial Intelligence
 
External Links
Snippet
In this study, we collected data on malware behavior and generated explanatory  descriptions using a large language model (LLM). The objective of this study is to determine  whether a given malware sample truly exhibits malicious behavior. To collect detailed … 
    - 238000004458 analytical method 0 title abstract description 46
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
 - G06F21/562—Static detection
 - G06F21/563—Static detection by source code analysis
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F9/00—Arrangements for programme control, e.g. control unit
 - G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
 - G06F9/44—Arrangements for executing specific programmes
 - G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
 - G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/36—Preventing errors by testing or debugging software
 - G06F11/362—Software debugging
 - G06F11/3636—Software debugging by tracing the execution of the program
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/36—Preventing errors by testing or debugging software
 - G06F11/3604—Software analysis for verifying properties of programs
 - G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F9/00—Arrangements for programme control, e.g. control unit
 - G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
 - G06F9/44—Arrangements for executing specific programmes
 - G06F9/4421—Execution paradigms
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
 - G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/30—Monitoring
 - G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
 - G06F11/3466—Performance evaluation by tracing or monitoring
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/36—Preventing errors by testing or debugging software
 - G06F11/3668—Software testing
 - G06F11/3672—Test management
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/30—Monitoring
 - G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
 - G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F9/00—Arrangements for programme control, e.g. control unit
 - G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
 - G06F9/46—Multiprogramming arrangements
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
 - G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F8/00—Arrangements for software engineering
 - G06F8/70—Software maintenance or management
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F8/00—Arrangements for software engineering
 - G06F8/40—Transformations of program code
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| US11983094B2 (en) | Software diagnostic context selection and use | |
| US20210149788A1 (en) | Software diagnosis using transparent decompilation | |
| Carmony et al. | Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. | |
| Zhang et al. | Dexhunter: toward extracting hidden code from packed android applications | |
| Kawakoya et al. | Memory behavior-based automatic malware unpacking in stealth debugging environment | |
| Alazab et al. | Towards understanding malware behaviour by the extraction of API calls | |
| Oliinyk et al. | Fuzzing {BusyBox}: Leveraging {LLM} and Crash Reuse for Embedded Bug Unearthing | |
| CN102043915B (en) | Method and device for detecting malicious code contained in non-executable file | |
| BR102015017215A2 (en) | computer-implemented method for classifying mobile applications, and computer program encoded on non-transient storage medium | |
| CN107103237A (en) | A kind of detection method and device of malicious file | |
| Kim et al. | Large-scale analysis on anti-analysis techniques in real-world malware | |
| Peddoju et al. | Natural language processing based anomalous system call sequences detection with virtual memory introspection | |
| Sun et al. | Dexx: a double layer unpacking framework for android | |
| Xu et al. | A dynamic taint analysis tool for Android app forensics | |
| Shosha et al. | Evasion-resistant malware signature based on profiling kernel data structure objects | |
| Chen et al. | ARMORY: An automatic security testing tool for buffer overflow defect detection | |
| CN119577739A (en) | A method and device for detecting container escape | |
| Yoneda et al. | Kernel-Level Malware Analysis and Behavioral Explanation Using LLMs | |
| Wen et al. | Keep me updated: An empirical study on embedded javascript engines in android apps | |
| KR102864815B1 (en) | Apparatus for processing cyber threat information, method for processing cyber threat information, and computationally-readable storage medium for storing a program processing cyber threat information | |
| Usui et al. | Script tainting was doomed from the start (by type conversion): Converting script engines into dynamic taint analysis frameworks | |
| KR102421394B1 (en) | Apparatus and method for detecting malicious code using tracing based on hardware and software | |
| Zhu et al. | Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs | |
| Gond et al. | System Calls for Malware Detection and Classification: Methodologies and Applications | |
| Raducu et al. | MALVADA: A framework for generating datasets of malware execution traces |