Carter, JohnMancoridis, SpirosProtopapas, Pavlos2024-12-262024-12-262025-01-07978-0-9981331-8-84d709582-a81c-4948-9857-eeb32cb82252https://hdl.handle.net/10125/109702As malware becomes increasingly stealthy and more difficult to detect, behavioral malware detection has become the preferred method of detection, which uses representative run-time data from the device to determine if an infection has occurred. In this work, we collected kernel-level system calls from a router serving IoT devices during periods of benign behavior and periods of known malware infection. The system calls were processed using our custom-trained sys2vec model, which created contextual embeddings for each system call observed. We then subjected the data to a classifier using a Gated Recurrent Unit (GRU) with an Attention layer. Although this pipeline performed well for noisy, easy-to-detect malware, it struggled with stealthier malware. To combat this, we trained a classifier that uses a custom-trained BERT encoder in place of the GRU/Attention layers, which results in much better detection at a usable false positive rate (FPR) ≤ 1 × 10−5.10Attribution-NonCommercial-NoDerivatives 4.0 InternationalCyber Operations, Defense, and Forensicsbehavioral malware detection, bert, language models, machine learningsysBERT: Improved Behavioral Malware Detection using BERT Trained on sys2vec EmbeddingsConference Paper