Poster
in
Affinity Workshop: WiML Workshop 1
Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability
Christine patterson · Edoardo Serra
Abstract:
To mitigate a malware threat, it is important to understand the malware’s behavior. The MITRE ATT&ACK ontology specifies an enumeration of tactics, techniques, and procedures(TTP) that characterize malware. However, absent are auto-mated procedures that would characterize, given the malware executable, which part of the execution flow is connected with a specific TTP. This paper provides an automation methodology to locate TTP in a sub-part of the control flow graph that describes the execution flow of a malware executable. This methodology merges graph representation learning and tools for machine learning explanation.
Chat is not available.