Check Point Software Technologies Ltd.
Method For Detection Of Malicious Applications
Last updated:
Abstract:
Systems and computerized and computer-implemented methods operate to detect malicious applications (APPs). A method, which is performed on a suitably designed computerized system, comprises: obtaining text associated with an application; inputting a representation of the text into a classifier; and, the classifier processing the representation of the text. The classifier processes the representation of the text by processes including: applying weights to words of the text for which the classifier has provided weights by a words attention process, such that the weighted words of each sentence form a sentence vector; analyzing the sentence vectors by a sentence attention process to obtain a single summary vector for the sentence vectors; and, from the single summary vector, determining a score that the application is malicious.
Utility
27 Oct 2020
28 Apr 2022