|国家预印本平台
首页|Semantic Preprocessing for LLM-based Malware Analysis

Semantic Preprocessing for LLM-based Malware Analysis

Semantic Preprocessing for LLM-based Malware Analysis

来源:Arxiv_logoArxiv
英文摘要

In a context of malware analysis, numerous approaches rely on Artificial Intelligence to handle a large volume of data. However, these techniques focus on data view (images, sequences) and not on an expert's view. Noticing this issue, we propose a preprocessing that focuses on expert knowledge to improve malware semantic analysis and result interpretability. We propose a new preprocessing method which creates JSON reports for Portable Executable files. These reports gather features from both static and behavioral analysis, and incorporate packer signature detection, MITRE ATT\&CK and Malware Behavior Catalog (MBC) knowledge. The purpose of this preprocessing is to gather a semantic representation of binary files, understandable by malware analysts, and that can enhance AI models' explainability for malicious files analysis. Using this preprocessing to train a Large Language Model for Malware classification, we achieve a weighted-average F1-score of 0.94 on a complex dataset, representative of market reality.

Tony Quertier、Grégoire Barrue、Benjamin Marais

计算技术、计算机技术

Tony Quertier,Grégoire Barrue,Benjamin Marais.Semantic Preprocessing for LLM-based Malware Analysis[EB/OL].(2025-06-26)[2025-07-21].https://arxiv.org/abs/2506.12113.点此复制

评论