Goodware Dataset used in "Disarming Visualization-Based Approaches in Malware Detection Systems"

Published: 23 April 2024| Version 3 | DOI: 10.17632/cv3v9szdn7.3
Contributors:
,
,
,

Description

This is one of the datasets used in the experiments of the paper: Fascí, L. S., Fisichella, M., Lax, G., & Qian, C. (2023). Disarming visualization-based approaches in malware detection systems. Computers & Security, 126, 103062. https://www.sciencedirect.com/science/article/pii/S0167404822004540 It contains 2.000 goodware files. We collected .exe files both by web scraping on different platforms (DriverPack Solution, Filehippo, Major Geeks, Portable Freeware, Softonic) and by using executables of two virtual machines right after installing the 32-bit version of Windows 8 and 10, respectively. To ensure that the collected .exe files are not malware, we scanned each file with VirusTotal software. The password to open the archive is Ben1gN@D$!?

Files

Categories

Malware Mitigation

Funding

European Commission

871042

Licence