shreyansh26 / Opcodes-for-Malware-Detection

Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar
MIT License
9 stars 2 forks source link

Could you please add more detailed source files? #1

Open 99hansling opened 3 years ago

99hansling commented 3 years ago

Hello, I am a college student and a new learner in the scope of malware detection, recently I was working on this research article, and was curious about how to realize the detection methods.

And I found this implementation,which thrilled me a lot.

However,compared to your another implementation,ELFMiner,this repository seemed to be simpler,and could not satisfy my thirsty for knowledge.

So,would it be possible that you could provide more detailed source files(e.g. how to obtain and enumerate the number of opcodes, how did you train the modules,etc.)

Plus,I have the same hope on your another linux malware detection,that is,the detection method based on symbolic tables.

Sincerely I'm looking forward to your early good news and sending my greatest thanks to you for your patience.

Best wishes!

99hansling commented 3 years ago

If it's not convenient for you to show all you works publicly, feel free to contact me with email: hans0991214@gmail.com

And I promise the codes will only be used for purpose of study.

Thanks!