This dataset is part of my PhD research on malware detection and classification using Deep Learning. It contains static analysis data: Raw PE byte stream rescaled to a 32 x 32 greyscale image using the Nearest Neighbor Interpolation algorithm and then flattened to a 1024 bytes vector. PE malware examples were downloaded from virusshare.com. PE goodware examples were downloaded from portableapps.com and from Windows 7 x86 directories.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] Angelo Oliveira, "Malware Analysis Datasets: Raw PE as Image", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/8brp-j220. Accessed: Sep. 22, 2020.
@data{8brp-j220-19,
doi = {10.21227/8brp-j220},
url = {http://dx.doi.org/10.21227/8brp-j220},
author = {Angelo Oliveira },
publisher = {IEEE Dataport},
title = {Malware Analysis Datasets: Raw PE as Image},
year = {2019} }
TY - DATA
T1 - Malware Analysis Datasets: Raw PE as Image
AU - Angelo Oliveira
PY - 2019
PB - IEEE Dataport
UR - 10.21227/8brp-j220
ER -
Angelo Oliveira. (2019). Malware Analysis Datasets: Raw PE as Image. IEEE Dataport. http://dx.doi.org/10.21227/8brp-j220
Angelo Oliveira, 2019. Malware Analysis Datasets: Raw PE as Image. Available at: http://dx.doi.org/10.21227/8brp-j220.
Angelo Oliveira. (2019). "Malware Analysis Datasets: Raw PE as Image." Web.
1. Angelo Oliveira. Malware Analysis Datasets: Raw PE as Image [Internet]. IEEE Dataport; 2019. Available from : http://dx.doi.org/10.21227/8brp-j220
Angelo Oliveira. "Malware Analysis Datasets: Raw PE as Image." doi: 10.21227/8brp-j220