Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 240800062-6.doi: 10.11896/jsjkx.240800062

• Information Security • Previous Articles     Next Articles

Research on Malware Classification Algorithm Based on Instruction Flow Graph

XING Yuyang, WANG Baohui   

  1. School of Software,Beihang University,Beijing 100191,China
  • Online:2025-11-15 Published:2025-11-10
  • About author:XING Yuyang,born in 1992,postgraduate.His main research interests include network security,big data and artificial intelligence.
    WANG Baohui,born in 1973,professor,master supervisor.His main research interests includenetwork security,big data and artificial intelligence.

Abstract: In recent years,malicious codes have become increasingly rampant,with both the quantity and types showing a rapid growth trend.Therefore,machine learning methods have been widely introduced to improve the efficiency of malicious code identification and classification.This paper focuses on the multi-classification task of malicious codes,adopts static analysis methods,and combines technologies such as disassembly,graph construction,as well as graph theories to extract features from the original files of malicious code samples.Based on the traditional CFG features and bytecode features,the IFG feature is proposed.The IFG feature,CFG feature,and bytecode feature are respectively used to train machine learning models for a horizontal comparison experiment.From the training effect:Compared with the CFG feature,using the IFG feature,the model’saccuracy rate increases by about 5%;compared with the bytecode feature,using the IFG feature,the model’s accuracy rate increases by 0.3%,and the mo-del’s training time is shortened by more than 60%.

Key words: Malicious code, Instruction flow graph, Classification, Machine learning

CLC Number: 

  • TP309
[1]AV-TEST:The Independent IT-Security Institute[EB/OL].https://www.av-test.org/en/statistics/malware.
[2]BHATIA T,KAUSHAL R.Malware detection in android based on dynamic analysis[C]//2017 International Conference on Cyber Security and Protection of Digital Services(Cyber Security).IEEE,2017.
[3]JIANG H,TURKI T,WANG J T L.DLGraph:Malware detection using deep learning and graph embedding[C]//2018 17th IEEE International Conference on Machine Learning and Applications(ICMLA).IEEE,2018:1029-1033.
[4]YANG S,LI S,CHEN W,et al.A real-time and adaptive-lear-ning malware detection method based on API-pair graph[J].IEEE Access,2020,8:208120-208135.
[5]ABUSNAINA A,ABUHAMAD M,ALASMARY H,et al.Dl-fhmc:Deep learning-based fine-grained hierarchical learning approach for robust malware classification[J].IEEE Transactions on Dependable and Secure Computing,2021,19(5):3432-3447.
[6]AGUIRRE J,PAPO D,BULDÚ J M.Successful strategies forcompeting networks[J].Nature Physics,2013,9(4):230-234.
[7]GOYAL M,KUMAR R.Machine Learning for Malware Detection on Balanced and Imbalanced Datasets[C]//2020 International Conference on Decision Aid Sciences and Application(DASA).IEEE,2020:867-871.
[8]KONG Z,XUE J,WANG Y,et al.MalFSM:Feature Subset Selection Method for Malware Family Classification[J].Chinese Journal of Electronics,2023,32(1):26-38.
[9]WU Z,ZHANG J,KOU L.A Model for Malware DetectionMethod based on API call Sequence Clustering[C]//2022 9th International Conference on Dependable Systems and Their Applications(DSA).IEEE,2022:1049-1050.
[10]SRIRAM S,VINAYAKUMAR R,SOWMYA V,et al.Multi-scale learning based malware variant detection using spatial pyramid pooling network[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2020:740-745.
[11]ALAM M,AKRAM A,SAEED T,et al.DeepMalware:A Deep Learning based Malware Images Classification[C]//2021 International Conference on Cyber Warfare and Security(ICCWS).IEEE,2021:93-99.
[1] CHEN Han, XU Zefeng, JIANG Jiu, FAN Fan, ZHANG Junjian, HE Chu, WANG Wenwei. Large Language Model and Deep Network Based Cognitive Assessment Automatic Diagnosis [J]. Computer Science, 2026, 53(3): 41-51.
[2] GE Zeqing, HUANG Shengjun. Semi-supervised Learning Method for Multi-label Tabular Data [J]. Computer Science, 2026, 53(3): 151-157.
[3] WANG Jinghong, LI Pengchao, WANG Xizhao, ZHANG Zili. Dual-channel Graph Neural Network Based on KAN [J]. Computer Science, 2026, 53(3): 188-196.
[4] QIN Jing, LI Guanfeng, CHEN Yuyin, XIAO Yuhang. Embedding Model of Knowledge Graph via Jointly Modeling Ontology and Instances [J]. Computer Science, 2026, 53(3): 331-340.
[5] WANG Xinyu, SONG Xiaomin, ZHENG Huiming, PENG Dezhong, CHEN Jie. Contrastive Learning-based Masked Graph Autoencoder [J]. Computer Science, 2026, 53(2): 145-151.
[6] CHEN Lin, MA Longxuan, ZHANG Yongbing, HUANG Yuxin, GAO Shengxiang, YU Zhengtao. Industrial Text Classification for Chinese and Vietnamese Based on Prompt Learning and AdaptiveLoss Weighting [J]. Computer Science, 2026, 53(2): 312-321.
[7] JIANG Lei, WANG Zi, YANG Rong, HAN Wanglin. Human Motion Recognition Algorithm Based on Wearable Sensors [J]. Computer Science, 2026, 53(2): 342-348.
[8] XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140.
[9] JIA Jingdong, HOU Xin, WANG Zhe, HUANG Jian. Research on User Data-driven App Fading Functions [J]. Computer Science, 2026, 53(1): 262-270.
[10] WANG Yongquan, SU Mengqi, SHI Qinglei, MA Yining, SUN Yangfan, WANG Changmiao, WANG Guoyou, XI Xiaoming, YIN Yilong, WAN Xiang. Research Progress of Machine Learning in Diagnosis and Treatment of Esophageal Cancer [J]. Computer Science, 2025, 52(9): 4-15.
[11] LI Fang, WANG Jie. DACSNet:Dual Attention Mechanism and Classification Supervision Network for Breast Lesion Detection in Ultrasound Images [J]. Computer Science, 2025, 52(9): 54-61.
[12] LIU Leyuan, CHEN Gege, WU Wei, WANG Yong, ZHOU Fan. Survey of Data Classification and Grading Studies [J]. Computer Science, 2025, 52(9): 195-211.
[13] JIANG Rui, FAN Shuwen, WANG Xiaoming, XU Youyun. Clustering Algorithm Based on Improved SOM Model [J]. Computer Science, 2025, 52(8): 162-170.
[14] WANG Jia, XIA Ying, FENG Jiangfan. Few-shot Video Action Recognition Based on Two-stage Spatio-Temporal Alignment [J]. Computer Science, 2025, 52(8): 251-258.
[15] ZHANG Yuan, ZHANG Shengjie, LIU Lilong, QIAN Shengsheng. Research on Continual Social Event Classification Based on Continual Event Knowledge Network [J]. Computer Science, 2025, 52(8): 268-276.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!