{"id":34871,"date":"2020-05-08T18:30:34","date_gmt":"2020-05-08T18:30:34","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91073"},"modified":"2020-05-08T18:30:34","modified_gmt":"2020-05-08T18:30:34","slug":"microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/","title":{"rendered":"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification"},"content":{"rendered":"<p>The opportunities for innovative approaches to threat detection through deep learning, a category of algorithms within the larger framework of machine learning, are vast. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/technology\/threat-protection\">Microsoft Threat Protection<\/a> today uses multiple deep learning-based classifiers that detect advanced threats, for example, evasive <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/09\/03\/deep-learning-rises-new-methods-for-detecting-malicious-powershell\/\">malicious PowerShell<\/a>.<\/p>\n<p>In continued exploration of novel detection techniques, researchers from Microsoft Threat Protection Intelligence Team and Intel Labs are collaborating to study new applications of deep learning for malware classification, specifically:<\/p>\n<ul>\n<li>Leveraging deep transfer learning technique from computer vision to static malware classification<\/li>\n<li>Optimizing deep learning techniques in terms of model size and leveraging platform hardware capabilities to improve execution of deep-learning malware detection approaches<\/li>\n<\/ul>\n<p>For the first part of the collaboration, the researchers built on Intel\u2019s prior work on <a href=\"https:\/\/arxiv.org\/pdf\/1812.07606.pdf\">deep transfer learning for static malware classification<\/a> and used a real-world dataset from Microsoft to ascertain the practical value of approaching the malware classification problem as a computer vision task. The basis for this study is the observation that if malware binaries are plotted as grayscale images, the textural and structural patterns can be used to effectively classify binaries as either benign or malicious, as well as cluster malicious binaries into respective threat families.<\/p>\n<p>The researchers used an approach that they called static malware-as-image network analysis (STAMINA). Using the dataset from Microsoft, the study showed that the STAMINA approach achieves high accuracy in detecting malware with low false positives.<\/p>\n<p>The results and further technical details of the research are listed in the paper <strong>\u201c<a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/artificial-intelligence\/documents\/stamina-deep-learning-for-malware-protection-whitepaper.html\" target=\"_blank\" rel=\"noopener noreferrer\">STAMINA: Scalable deep learning approach for malware classification<\/a>\u201d<\/strong> and set the stage for further collaborative exploration.<\/p>\n<h3>The role of static analysis in deep learning-based malware classification<\/h3>\n<p>While static analysis is typically associated with traditional detection methods, it remains to be an important building block for AI-driven detection of malware. It is especially useful for pre-execution detection engines: static analysis disassembles code without having to run applications or monitor runtime behavior.<\/p>\n<p>Static analysis produces metadata about a file. Machine learning classifiers on the client and in the cloud then analyze the metadata and determine whether a file is malicious. Through static analysis, most threats are caught before they can even run.<\/p>\n<p>For more complex threats, dynamic analysis and behavior analysis build on static analysis to provide more features and build more comprehensive detection. Finding ways to perform static analysis at scale and with high effectiveness benefits overall malware detection methodologies.<\/p>\n<p>To this end, the research borrowed knowledge from &nbsp;computer vision domain to build an enhanced static malware detection framework that leverages deep transfer learning to train directly on portable executable (PE) binaries represented as images.<\/p>\n<h3>Analyzing malware represented as image<\/h3>\n<p>To establish the practicality of the STAMINA approach, which posits that malware can be classified at scale by performing static analysis on malware codes represented as images, the study covered three main steps: image conversion, transfer learning, and evaluation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91074\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-steps-blog.png\" alt=\"Diagram showing the steps for the STAMINA approach: pre-processing, transfer learning, and evaluation\" width=\"800\" height=\"287\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-steps-blog.png 800w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-steps-blog-300x108.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-steps-blog-768x276.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/p>\n<p>First, the researchers prepared the binaries by converting them into two-dimensional images. This step involved pixel conversion, reshaping, and resizing. The binaries were converted into a one-dimensional pixel stream by assigning each byte a value between 0 and 255, corresponding to pixel intensity. Each pixel stream was then transformed into a two-dimensional image by using the file size to determine the width and height of the image.<\/p>\n<p>The second step was to use transfer learning, a technique for overcoming the isolated learning paradigm and utilizing knowledge acquired for one task to solve related ones. Transfer learning has enjoyed tremendous success within several different computer vision applications. It accelerates training time by bypassing the need to search for optimized hyperparameters and different architectures\u2014all this while maintaining high classification performance. For this study, the researchers used Inception-v1 as the base model.<\/p>\n<p>The study was performed on a dataset of 2.2 million PE file hashes provided by Microsoft. This dataset was temporally split into 60:20:20 segments for training, validation, and test sets, respectively.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-91076 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-transfer-learning-blog.png\" alt=\"Diagram showing a DNN with pre-trained weights on natural images, and the last portion fine-tuned with new data\" width=\"800\" height=\"321\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-transfer-learning-blog.png 800w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-transfer-learning-blog-300x120.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/stamina-transfer-learning-blog-768x308.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/p>\n<p>Finally, the performance of the system was measured and reported on the holdout test set. The metrics captured include recall at specific false positive range, along with accuracy, F1 score, and area under the receiver operating curve (ROC).<\/p>\n<h3>Findings<\/h3>\n<p>The joint research showed that applying STAMINA to real-world hold-out test data set achieved a recall of 87.05% at 0.1% false positive rate, and 99.66% recall and 99.07% accuracy at 2.58% false positive rate overall. The results certainly encourage the use of deep transfer learning for the purpose of malware classification. It helps accelerate training by bypassing the search for optimal hyperparameters and architecture searches, saving time and compute resources in the process.<\/p>\n<p>The study also highlights the pros and cons of sample-based methods like STAMINA and metadata-based classification methods. For example, STAMINA can go in-depth into samples and extract additional signals that might not be captured in the metadata.&nbsp; However, for bigger size applications, STAMINA becomes less effective due to limitations in converting billions of pixels into JPEG images and then resizing them. In such cases, metadata-based methods show advantages over our research.<\/p>\n<h3>Conclusion and future work<\/h3>\n<p>The use of deep learning methods for detecting threats drives a lot of innovation across Microsoft. The collaboration with Intel Labs researchers is just one of the ways in which Microsoft researchers and data scientists continue to explore novel ways to improve security overall.<\/p>\n<p>This <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/artificial-intelligence\/documents\/stamina-deep-learning-for-malware-protection-whitepaper.html\" target=\"_blank\" rel=\"noopener noreferrer\">joint research<\/a> is a good starting ground for more collaborative work. For example, the researchers plan to collaborate further on platform acceleration optimizations that can allow deep learning models to be deployed on client machines with minimal performance impact. Stay tuned.<\/p>\n<p><strong><em>Jugal Parikh, Marc Marino<\/em><\/strong><\/p>\n<p><em>Microsoft Threat Protection Intelligence Team<\/em><\/p>\n<p><em>&nbsp;<\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/05\/08\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from Microsoft Threat Protection Intelligence Team and Intel Labs collaborated to study the application of deep transfer learning technique from computer vision to static malware classification.<br \/>\nThe post Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34872,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6859,347,7656,351,8636,7221,8637],"class_list":["post-34871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-ai-and-machine-learning","tag-cybersecurity","tag-deep-learning","tag-machine-learning","tag-malware-as-image","tag-microsoft-security-intelligence","tag-transfer-learning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T18:30:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"287\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification\",\"datePublished\":\"2020-05-08T18:30:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/\"},\"wordCount\":938,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png\",\"keywords\":[\"AI and machine learning\",\"Cybersecurity\",\"deep learning\",\"machine learning\",\"malware-as-image\",\"Microsoft security intelligence\",\"transfer learning\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/\",\"name\":\"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png\",\"datePublished\":\"2020-05-08T18:30:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png\",\"width\":800,\"height\":287},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI and machine learning\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/ai-and-machine-learning\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-08T18:30:34+00:00","og_image":[{"width":800,"height":287,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification","datePublished":"2020-05-08T18:30:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/"},"wordCount":938,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png","keywords":["AI and machine learning","Cybersecurity","deep learning","machine learning","malware-as-image","Microsoft security intelligence","transfer learning"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/","name":"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png","datePublished":"2020-05-08T18:30:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification.png","width":800,"height":287},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-researchers-work-with-intel-labs-to-explore-new-deep-learning-approaches-for-malware-classification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AI and machine learning","item":"https:\/\/www.threatshub.org\/blog\/tag\/ai-and-machine-learning\/"},{"@type":"ListItem","position":3,"name":"Microsoft researchers work with Intel Labs to explore new deep learning approaches for malware classification"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34871"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34872"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}