{"title":"VADViT:用于恶意进程检测和可解释威胁归因的视觉转换器驱动的内存取证","authors":"Yasin Dehfouli , Arash Habibi Lashkari","doi":"10.1016/j.jisa.2025.104200","DOIUrl":null,"url":null,"abstract":"<div><div>Modern malware’s increasing complexity limits traditional signature- and heuristic-based detection, necessitating advanced memory forensic techniques. Machine learning methods have been explored, but many rely on outdated feature sets and require significant domain knowledge for feature extraction. Also, handling large-scale memory data — especially in image-based approaches — poses challenges in efficiency and forensic explainability. We propose VADViT, a vision transformer-based model for detecting malicious processes by analyzing Virtual Address Descriptor (VAD) memory regions to address these limitations. VADViT transforms these regions into fused Markov, entropy, and intensity images, enabling effective classification using a Vision Transformer (ViT) with self-attention mechanisms. We also introduce BCCC-MalMem-SnapLog-2025, a new dataset that captures memory dumps at regular intervals and logs PIDs, enabling precise VAD extraction without relying on dynamic analysis. VADViT achieves 99% accuracy in binary classification and a 92% macro-averaged F1 score in multi-class detection. Attention-based sorting of VAD regions further improves forensic efficiency by narrowing the analysis scope to the most relevant memory areas.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104200"},"PeriodicalIF":3.7000,"publicationDate":"2025-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"VADViT: Vision transformer-driven memory forensics for malicious process detection and explainable threat attribution\",\"authors\":\"Yasin Dehfouli , Arash Habibi Lashkari\",\"doi\":\"10.1016/j.jisa.2025.104200\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Modern malware’s increasing complexity limits traditional signature- and heuristic-based detection, necessitating advanced memory forensic techniques. Machine learning methods have been explored, but many rely on outdated feature sets and require significant domain knowledge for feature extraction. Also, handling large-scale memory data — especially in image-based approaches — poses challenges in efficiency and forensic explainability. We propose VADViT, a vision transformer-based model for detecting malicious processes by analyzing Virtual Address Descriptor (VAD) memory regions to address these limitations. VADViT transforms these regions into fused Markov, entropy, and intensity images, enabling effective classification using a Vision Transformer (ViT) with self-attention mechanisms. We also introduce BCCC-MalMem-SnapLog-2025, a new dataset that captures memory dumps at regular intervals and logs PIDs, enabling precise VAD extraction without relying on dynamic analysis. VADViT achieves 99% accuracy in binary classification and a 92% macro-averaged F1 score in multi-class detection. Attention-based sorting of VAD regions further improves forensic efficiency by narrowing the analysis scope to the most relevant memory areas.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"94 \",\"pages\":\"Article 104200\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-08-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625002376\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002376","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
VADViT: Vision transformer-driven memory forensics for malicious process detection and explainable threat attribution
Modern malware’s increasing complexity limits traditional signature- and heuristic-based detection, necessitating advanced memory forensic techniques. Machine learning methods have been explored, but many rely on outdated feature sets and require significant domain knowledge for feature extraction. Also, handling large-scale memory data — especially in image-based approaches — poses challenges in efficiency and forensic explainability. We propose VADViT, a vision transformer-based model for detecting malicious processes by analyzing Virtual Address Descriptor (VAD) memory regions to address these limitations. VADViT transforms these regions into fused Markov, entropy, and intensity images, enabling effective classification using a Vision Transformer (ViT) with self-attention mechanisms. We also introduce BCCC-MalMem-SnapLog-2025, a new dataset that captures memory dumps at regular intervals and logs PIDs, enabling precise VAD extraction without relying on dynamic analysis. VADViT achieves 99% accuracy in binary classification and a 92% macro-averaged F1 score in multi-class detection. Attention-based sorting of VAD regions further improves forensic efficiency by narrowing the analysis scope to the most relevant memory areas.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.