Abstract
Considering that current antimalware, typically based on signature-based approaches, are not able to identify threats whose signatures are not present in the antiviral database, in this paper we propose a method to identify malware based on deep learning, in particular on convolutional neural networks to identify whether an application is malicious. A distinctive feature of the proposed method is the ability to explain the reasons why the classifier predicts whether an application is malware or trusted, in fact in addition to the binary prediction, the proposed method is able to select the opcodes of the identified application that according to the model are symptomatic of the malicious behavior, thus providing a kind of explainability. Experimental results have shown satisfactory results, thus demonstrating the effectiveness of the proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
identified by the 52b9970cf2d50af70ad1938a77e44c41a334667fbcf6e08506b9a209cc1e1d2d hash.
- 3.
- 4.
identified by the 52e12f1e41fb8d7763a7c2966a53e6e7b7c3a9275a5942e9d7ff1cd84708d9a6 hash.
- 5.
- 6.
identified by the 2d901bf0cb31995d596329a8406471c6e82671811c0d16255cfa02154e6dd90b.
- 7.
- 8.
identified by the 4c77b3ecfe7ff1be8b05f7bc58d2360531c67997c3fae399f6f24132cb05065a.
- 9.
- 10.
- 11.
0ab06167cb7fd6d00a08079bbcd2d2ca05cbb5a9edaa943543dca37d7aaed05b hash.
- 12.
- 13.
0ae694c5332ae2c89f5cfb1e65ac6805c34e02c0b63b33197b5cb7f554c7cf76 hash.
- 14.
References
Almobaideen, W., Abu Alghanam, O., Abdullah, M., Hussain, S.B., Alam, U.: Comprehensive review on machine learning and deep learning techniques for malware detection in android and IOT devices. Int. J. Inf. Secur. 24(3), 1–34 (2025)
Azeez, N.A., Odufuwa, O.E., Misra, S., Oluranti, J., Damaševičius, R.: Windows PE malware detection using ensemble learning. Informatics 8, 10 (2021)
Biondi, F., Enescu, M.A., Given-Wilson, T., Legay, A., Noureddine, L., Verma, V.: Effective, efficient, and robust packing detection and classification. Comput. Secur. 85, 436–451 (2019)
Borgli, H., Stensland, H.K., Halvorsen, P.: Better image segmentation with classification: guiding zero-shot models using class activation maps. In: International Conference on Multimedia Modeling, pp. 105–111. Springer (2025)
Chander, B., John, C., Warrier, L., Gopalakrishnan, K.: Toward trustworthy artificial intelligence (tai) in the context of explainability and robustness. ACM Comput. Surv. 57(6), 1–49 (2025)
Chen, X., et al.: Deep learning-based software engineering: progress, challenges, and opportunities. SCI. CHINA Inf. Sci. 68(1), 1–88 (2025)
Ciaramella, G., Iadarola, G., Martinelli, F., Mercaldo, F., Santone, A.: Explainable ransomware detection with deep learning techniques. J. Comput. Virol. Hacking Tech. 20(2), 317–330 (2024)
Devi, D., Nandi, S.: Detection of packed malware. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 22–26 (2012)
Di Giammarco, M., et al.: A robust and explainable deep learning method for cervical cancer screening. In: International Conference on Applied Intelligence and Informatics, pp. 111–125. Springer (2023)
Gao, X., Hu, C., Shan, C., Han, W.: Malicage: a packed malware family classification framework based on DNN and GAN. J. Inf. Secur. Appl. 68, 103267 (2022). https://doi.org/10.1016/j.jisa.2022.103267, https://www.sciencedirect.com/science/article/pii/S2214212622001296
He, H., Yang, H., Mercaldo, F., Santone, A., Huang, P.: Isolation forest-voting fusion-multioutput: a stroke risk classification method based on the multidimensional output of abnormal sample detection. Comput. Methods Programs Biomed. 108255 (2024)
Huang, X., Ma, L., Yang, W., Zhong, Y.: A method for windows malware detection based on deep learning. J. Sig. Process. Syst. 93, 265–273 (2021)
Iadarola, G., Martinelli, F., Mercaldo, F., Santone, A.: Towards an interpretable deep learning model for mobile malware detection and family identification. Comput. Secur. 105, 102198 (2021)
Kim, J.W., Namgung, J., Moon, Y.S., Choi, M.J.: Experimental comparison of machine learning models in malware packing detection. In: 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 377–380. IEEE (2020)
Martinelli, F., Mercaldo, F., Petrillo, L., Santone, A.: Security policy generation and verification through large language models: a proposal. In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, pp. 143–145 (2024)
Qu, Y., et al.: CGAM: an end-to-end causality graph attention mamba network for esophageal pathology grading. Biomed. Signal Process. Control 103, 107452 (2025)
Rabadi, D., Teo, S.G.: Advanced windows methods on malware detection and classification. In: Proceedings of the 36th Annual Computer Security Applications Conference, pp. 54–68 (2020)
Rabitti, G., Khorrami Chokami, A., Coyle, P., Cohen, R.D.: A taxonomy of cyber risk taxonomies. Risk Anal. 45(2), 376–386 (2025)
Acknowledgment
This work has been partially supported by EU DUCA, EU CyberSecPro, SYNAPSE, PTR 22-24 P2.01 (Cybersecurity) and SERICS (PE00000014) under the MUR National Recovery and Resilience Plan funded by the EU - NextGenerationEU projects, by MUR - REASONING: foRmal mEthods for computAtional analySis for diagnOsis and progNosis in imagING - PRIN, e-DAI (Digital ecosystem for integrated analysis of heterogeneous health data related to high-impact diseases: innovative model of care and research), Health Operational Plan, FSC 2014-2020, PRIN-MUR-Ministry of Health, Progetto MolisCTe, Ministero delle Imprese e del Made in Italy, Italy, CUP: D33B22000060001, FORESEEN: FORmal mEthodS for attack dEtEction in autonomous driviNg systems CUP N.P2022WYAEW and ALOHA: a framework for monitoring the physical and psychological health status of the Worker through Object detection and federated machine learning, Call for Collaborative Research BRiC -2024, INAIL.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mercaldo, F., Tavolato, P., Santone, A., Martinelli, F. (2025). An Explainable Method for Malware Detection Through Convolutional Neural Networks. In: Coppens, B., Volckaert, B., Naessens, V., De Sutter, B. (eds) Availability, Reliability and Security. ARES 2025. Lecture Notes in Computer Science, vol 15994. Springer, Cham. https://doi.org/10.1007/978-3-032-00630-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-032-00630-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-032-00629-5
Online ISBN: 978-3-032-00630-1
eBook Packages: Computer ScienceComputer Science (R0)