Write a Blog >>
ESEC/FSE 2021
Thu 19 - Sat 28 August 2021 Clowdr Platform
Fri 27 Aug 2021 17:20 - 17:30 - Dependability—Software Security 2 Chair(s): Vaggelis Atlidakis
Sat 28 Aug 2021 05:20 - 05:30 - Dependability—Software Security 2 Chair(s): Arie Gurfinkel

Driven by the high profit, Portable Executable (PE) malware has been consistently evolving in terms of both volume and sophistication. PE malware family classification has gained great attention and a large number of approaches have been proposed. With the rapid development of machine learning techniques and the exciting results they achieved on various tasks, machine learning algorithms have also gained popularity in the PE malware family classification task. Three mainstream approaches that use learning based algorithms, as categorized by the input format the methods take, are image-based, binary-based and disassembly-based approaches.
Although a large number of approaches are published, there is no consistent comparisons on those approaches, especially from the practical industry adoption perspective. Moreover, there is no comparison in the scenario of concept drift, which is a fact for the malware classification task due to the fast evolving nature of malware. In this work, we conduct a thorough empirical study on learning-based PE malware classification approaches on 4 different datasets and consistent experiment settings. Based on the experiment results and an interview with our industry partners, we find that (1) there is no individual class of methods that significantly outperforms the others; (2) All classes of methods show performance degradation on concept drift (by an average F1-score of 32.23%); and (3) the prediction time and high memory consumption hinder existing approaches from being adopted for industry usage.

Fri 27 Aug

Displayed time zone: Athens change

17:00 - 18:00
Dependability—Software Security 2Research Papers / Industry Papers / Journal First +12h
Chair(s): Vaggelis Atlidakis Brown University
17:00
10m
Paper
TaintStream: Fine-Grained Taint Tracking for Big Data Platforms through Dynamic Code Translation
Research Papers
Chengxu Yang Peking University, Yuanchun Li Microsoft Research, Mengwei Xu Beijing University of Posts and Telecommunications, Zhenpeng Chen Peking University, Yunxin Liu Tsinghua University, Gang Huang Peking University, Xuanzhe Liu Peking University
DOI Pre-print
17:10
10m
Paper
How to Better Distinguish Security Bug Reports (using Dual Hyperparameter Optimization)
Journal First
Rui Shu North Carolina State University, Tianpei Xia North Carolina State University, Jianfeng Chen North Carolina State University, Laurie Williams North Carolina State University, Tim Menzies North Carolina State University
17:20
10m
Paper
A Comprehensive Study on Learning-Based PE Malware Family Classification Methods
Industry Papers
Yixuan Ma State Key Laboratory of Communication Content Cognition; Tianjin University, Shuang Liu Tianjin University, Jiajun Jiang Tianjin University, Guanhong Chen Tianjin University, Keqiu Li Tianjin University
DOI
17:30
30m
Live Q&A
Q&A (Dependability—Software Security 2)
Research Papers

Sat 28 Aug

Displayed time zone: Athens change

05:00 - 06:00
Dependability—Software Security 2Research Papers / Industry Papers / Journal First
Chair(s): Arie Gurfinkel University of Waterloo
05:00
10m
Paper
TaintStream: Fine-Grained Taint Tracking for Big Data Platforms through Dynamic Code Translation
Research Papers
Chengxu Yang Peking University, Yuanchun Li Microsoft Research, Mengwei Xu Beijing University of Posts and Telecommunications, Zhenpeng Chen Peking University, Yunxin Liu Tsinghua University, Gang Huang Peking University, Xuanzhe Liu Peking University
DOI Pre-print
05:10
10m
Paper
How to Better Distinguish Security Bug Reports (using Dual Hyperparameter Optimization)
Journal First
Rui Shu North Carolina State University, Tianpei Xia North Carolina State University, Jianfeng Chen North Carolina State University, Laurie Williams North Carolina State University, Tim Menzies North Carolina State University
05:20
10m
Paper
A Comprehensive Study on Learning-Based PE Malware Family Classification Methods
Industry Papers
Yixuan Ma State Key Laboratory of Communication Content Cognition; Tianjin University, Shuang Liu Tianjin University, Jiajun Jiang Tianjin University, Guanhong Chen Tianjin University, Keqiu Li Tianjin University
DOI
05:30
30m
Live Q&A
Q&A (Dependability—Software Security 2)
Research Papers