Microsoft and Intel turn malware into images to accelerate detection

Results of STAMINA project "encourage the use of deep transfer learning" for malware classification

Microsoft and Intel have collaborated on a new research project which uses a deep learning technique to identify malware through the analysis of images. 

The project, titled Static Malware-as-Image Network Analysis (STAMINA), advances on the approach that malware can be classified at scale by performing static analysis on malware codes represented as images. Based on that, it aims to detect malware by transforming malware samples into grayscale images and then scanning them for specific textural and structural patterns.

In order to establish the practicality of the STAMINA approach, researchers from Microsoft Threat Protection Intelligence Team and Intel Labs covered three main steps: image conversion, transfer learning, and evaluation.

First, the researchers converted malware binaries into two-dimensional images, they then used the transfer learning technique to accelerate training time “while maintaining high classification performance”. Finally, they evaluated the performance of the system on a holdout test set. The study showed that applying STAMINA achieved a recall of 87.05% at a 0.1% false-positive rate, and a 99.66% recall and 99.07% accuracy at a 2.58% false-positive rate.

In a blog post detailing the study, Jugal Parikh and Marc Marino of the Microsoft Threat Protection Intelligence Team said that the results “certainly encourage the use of deep transfer learning for the purpose of malware classification”.

“It helps accelerate training by bypassing the search for optimal hyperparameters and architecture searches, saving time and compute resources in the process,” they said.

Parikh and Marino also said that the joint research is “a good starting ground for more collaborative work” between Microsoft and Intel. 

“For example, the researchers plan to collaborate further on platform acceleration optimizations that can allow deep learning models to be deployed on client machines with minimal performance impact. Stay tuned,” they said.

A new way of detecting malware is undoubtedly a welcome innovation in a time when most employees are working from home due to the coronavirus lockdown, exposing businesses to a higher rate of cyber attacks. 

Last month, Microsoft warned that cyber criminals are taking advantage of the ongoing coronavirus crisis to trick users into downloading malware onto their devices. In a statement on Twitter, Microsoft Security Intelligence said that hackers are posing as the “Usa Volunteer Organization” and the “Usa Humanitarian Group” and are sending out hundreds of emails offering free COVID-19 medical advice and testing. Each email aims to install the Trickbot malware using “unique macro-laced” document attachments.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Android malware vendor teams with marketer to promote new malware
malware

Android malware vendor teams with marketer to promote new malware

11 Jan 2021
Python-based malware steals Outlook files and browser credentials
malware

Python-based malware steals Outlook files and browser credentials

15 Dec 2020
Subway UK customers targeted by Trickbot hackers
hacking

Subway UK customers targeted by Trickbot hackers

14 Dec 2020
Power banks could infect your smartphone with malware
malware

Power banks could infect your smartphone with malware

9 Dec 2020

Most Popular

How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
The fate of Parler exposes the reality of deregulated social media
Policy & legislation

The fate of Parler exposes the reality of deregulated social media

14 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021