ViT4Mal: Lightweight Vision Transformer for Malware Detection on Edge Devices

被引:12
作者
Ravi, Akshara [1 ]
Chaturvedi, Vivek [1 ]
Shafique, Muhammad [2 ]
机构
[1] Indian Inst Technol Palakkad, Palakkad, Kerala, India
[2] NYU Abu Dhabi NYUAD, Abu Dhabi, U Arab Emirates
关键词
IoT; malware; vision transformer (ViT); FPGA; inference latency; hardware optimization; matrix multiplication; resource-constrained;
D O I
10.1145/3609112
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There has been a tremendous growth of edge devices connected to the network in recent years. Although these devices make our life simpler and smarter, they need to perform computations under severe resource and energy constraints, while being vulnerable to malware attacks. Once compromised, these devices are further exploited as attack vectors targeting critical infrastructure. Most existing malware detection solutions are resource and compute-intensive and hence perform poorly in protecting edge devices. In this paper, we propose a novel approach ViT4Mal that utilizes a lightweight vision transformer (ViT) for malware detection on an edge device. ViT4Mal first converts executable byte-code into images to learn malware features and later uses a customized lightweight ViT to detect malware with high accuracy. We have performed extensive experiments to compare our model with state-of-the-art CNNs in the malware detection domain. Experimental results corroborate that ViTs don't demand deeper networks to achieve comparable accuracy of around 97% corresponding to heavily structured CNN models. We have also performed hardware deployment of our proposed lightweight ViT4Mal model on the Xilinx PYNQ Z1 FPGA board by applying specialized hardware optimizations such as quantization, loop pipelining, and array partitioning. ViT4Mal achieved an accuracy of similar to 94% and a 41x speedup compared to the original ViT model.
引用
收藏
页数:26
相关论文
共 58 条
[31]   Static analysis of android apps: A systematic literature review [J].
Li, Li ;
Bissyande, Tegawende F. ;
Papadakis, Mike ;
Rasthofer, Siegfried ;
Bartel, Alexandre ;
Octeau, Damien ;
Klein, Jacques ;
Traon, Le .
INFORMATION AND SOFTWARE TECHNOLOGY, 2017, 88 :67-95
[32]  
Michel P, 2019, ADV NEUR IN, V32
[33]   Malware detection in industrial internet of things based on hybrid image visualization and deep learning model [J].
Naeem, Hamad ;
Ullah, Farhan ;
Naeem, Muhammad Rashid ;
Khalid, Shehzad ;
Vasan, Danish ;
Jabbar, Sohail ;
Saeed, Saqib .
AD HOC NETWORKS, 2020, 105
[34]  
Naeem H, 2018, 2018 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA (ICAIBD), P240, DOI 10.1109/ICAIBD.2018.8396202
[35]  
Nataraj L., 2011, Proceedings of Visualization for Cyber Security, P1, DOI DOI 10.1145/2016904.2016908
[36]   SPAM: Signal Processing to Analyze Malware [J].
Nataraj, Lakshmanan ;
Manjunath, B. S. .
IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (02) :105-+
[37]  
Nataraj Lakshmanan., 2011, WORKSHOP SECURITY AR, P21, DOI DOI 10.1145/2046684.2046689
[38]  
Oberheide J., 2008, USENIX SEC S, P91
[39]  
Pa Pa YinMinn., 2015, 9th USENIX Workshop on Offensive Technologies (WOOT 15), V9, P1
[40]  
Pa YMP, 2016, Journal of Information Processing, V24, P522, DOI [10.2197/ipsjjip.24.522, DOI 10.2197/IPSJJIP.24.522]