| CPC G06F 21/562 (2013.01) [G06F 2221/033 (2013.01)] | 17 Claims |

|
1. A computer-implemented method, comprising:
removing attack channels from software to generate attack-channel-free software, the attack-channel-free software including byte reset software;
extracting component-based features from the attack-channel free software, the component-based features being specific to independent components of the byte reset software, the byte reset software being software with unmapped bytes reset, the reset unmapped bytes in the byte reset software being configured to reduce adversarial attacks;
extracting monotonic features from the attack-channel free software, the monotonic features being features in the byte reset software;
graphically encoding the component-based features to generate graphically-encoded component-based features, wherein the component-based features are graphically encoded using a graph attention network; and
using the graphically-encoded component-based features and the monotonic features to detect malware in a malware detection system.
|