Welcome to Scholar Publishing Group

International Journal of Big Data Intelligent Technology, 2025, 6(1); doi: 10.38007/IJBDIT.2025.060109.

Research on Malicious Code Detection Technology for Binary and WASM Bytecode Files in Web3.0 Distributed Applications

Author(s)

Hongjun Wu

Corresponding Author:
Hongjun Wu
Affiliation(s)

Department of AI/ML, Bullpen Labs, Inc, New York, NY, 10044, USA

Abstract

In Web3.0 distributed applications, the research on malicious code detection technology of binary and WASM bytecode files aims to meet the security challenges brought by the emerging Internet phase. This study proposes MalRing method and detection method based on N-gram feature extraction and gradient boosting tree for binary files on traditional platforms and WASM bytecode files in browser environments, respectively. The MalRing method utilizes multimodal fusion features (combining control flow graph and byte flow) for malicious code detection, and processes the features through node feature segmentation algorithm and ring domain extraction algorithm to deal with adversarial samples of control flow confusion. Experiments have shown that MalRing outperforms the baseline model in terms of accuracy. For WASM bytecode files, this study adopts the N-gram feature extraction method, selects features through out of bag errors, and fits the feature vectors using gradient boosting trees to obtain an algorithm model for malicious code detection. However, there are still some issues in current research, such as the high cost of binary file sample parsing and structural feature extraction, the lack of controllability and granularity in adversarial sample generation methods, and the lack of validation of WASM bytecode detection methods in practical systems. Therefore, future research directions will include optimizing sample parsing methods, improving adversarial sample generation methods, and enhancing the malicious code detection system for WASM bytecode, in order to improve the accuracy and efficiency of malicious code detection and provide strong support for the secure development of the Web3.0 ecosystem.

Keywords

Web3.0 distributed applications, binary files, WASM bytecode, malicious code detection, multimodal fusion features

Cite This Paper

Hongjun Wu. Research on Malicious Code Detection Technology for Binary and WASM Bytecode Files in Web3.0 Distributed Applications. International Journal of Big Data Intelligent Technology (2025), Vol. 6, Issue 1: 92-100. https://doi.org/10.38007/IJBDIT.2025.060109.

References

[1] Xu, Yue. "Research on Maiustream Web Database Development Technclogy." Journal of Computer Science and Artificial Intelligence 2.2 (2025): 29-32.

[2] Zhu, Zhongqi. "Strategies for Improving Vector Database Performance through Algorithm Optimization." Scientific Journal of Technology 7.2 (2025): 138-144.

[3] Chen, Junyu. "Research on Intelligent Data Mining Technology Based on Geographic Information System." Journal of Computer Science and Artificial Intelligence 2.2 (2025): 12-16.

[4] Xu, Qianru. "Practical Applications of Large Language Models in Enterprise-Level Applications." Journal of Computer Science and Artificial Intelligence 2.2 (2025): 17-21.

[5] Liu Z. Application of Machine Learning in Financial Risk Classification and Account Verification Optimization Strategy[J]. Economics and Management Innovation, 2025, 2(2): 64-70.

[6] Wang, Buqin. "Strategies and Practices for Load Test Optimization in Distributed Systems." Scientific Journal of Technology 7.2 (2025): 132-137.

[7] Dong P. Research on the Application of Knowledge Graph-Driven Two-Dimensional Convolutional Embedding Methods in Recommender Systems[C]//2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025: 1-6.

[8] Zhu P. Construction and Experimental Verification[C]//Cyber Security Intelligence and Analytics: The 6th International Conference on Cyber Security Intelligence and Analytics (CSIA 2024), Volume 1. Springer Nature, 2025, 1351: 391.

[9] Liu Z. Research on the Application of Signal Integration Model in Real-Time Response to Social Events[J]. Journal of Computer, Signal, and System Research, 2025, 2(2): 102-106.

[10] Ding, Maomao. "Design Innovation and User Satisfaction Improvement of AI Video Creation Tools." Scientific Journal of Technology 7.2 (2025): 112-117.

[11] Xu H. OLAP Technology Financial Statistics Information Platform Based on Big Data Analysis[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 283-293.

[12] Ma Z. Strategies for Enhancing Customer Lifetime Value through Data Modeling[J]. European Journal of Business, Economics & Management, 2025, 1(1): 1-7.

[13] Zhang, Jingtian. "Research on Worker Allocation Optimization Based on Real-Time Data in Cloud Computing." Frontiers in Science and Engineering 5.2 (2025): 119-125.

[14] Gu, Yiting. "Practical Approaches to Develo**High-performance Web Applications Based on React." Frontiers in Science and Engineering 5.2 (2025): 99-105.

[15] Fan, Yijiao. "Credit Rating Optimization Model Based." Cyber Security Intelligence and Analytics: The 6th International Conference on Cyber Security Intelligence and Analytics (CSIA 2024), Volume 1. Vol. 1351. Springer Nature, 2025.

[16] Shanshan Feng, Ke Ma, Gongpin Cheng, Risk Evolution along the Oil and Gas Industry Chain: Insights from Text Mining Analysis, Finance Research Letters, 2025, 106813, ISSN 1544-6123

[17] Xu H. OLAP Technology Financial Statistics Information Platform Based on Big Data Analysis[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 283-293.

[18] Ma Z. Innovative Application of Reinforcement Learning in User Growth and Behavior Prediction[J]. European Journal of AI, Computing & Informatics, 2025, 1(1): 18-24.

[19] Xu, Yue. "Research on Graph Network Social Recommendation Algorithm Based on AGRU-GNN." 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2024.

[20] Ma, K., Zhang, N., Mei, X., Feng, C., Hou, W., & Ye, Z. (2024, October). Research on Optimization of Shared Bicycle Scheduling Based on Genetic Algorithm and LSTM. In 2024 IEEE 6th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (pp. 936-940). IEEE.

[21] Chen, H., Zhu, Y., Zuo, J., Kabir, M. R., & Han, A. (2024). TranSpeed: Transformer-based Generative Adversarial Network for Speed-of-sound Reconstruction in Pulse-echo Mode. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.

[22] Chen, H., Zuo, J., Zhu, Y., Kabir, M. R., & Han, A. (2024). Generalizable Deep Learning for Pulse-echo Speed of Sound Imaging via Time-shift Maps. In 2024 IEEE Ultrasonics, Ferroelectrics, and Frequency Control Joint Symposium (UFFC-JS) (pp. 1-4). IEEE.

[23] Huang, Tianyou. "Construction and Application of Financial Risk Warning System for Third-Party Payment Enterprises Based on Z-Score Model and Efficacy Coefficient Method." Academic Journal of Business & Management 6.12 (2024): 121-126.

[24] Liu Y. Optimization of Financial Fraud Detection Algorithm by Combining Variational Autoencoder with Generative Adversarial Networks[C]//2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024: 1-7.

[25] Zhao F. Application and Performance Improvement of K-Means Algorithm in Collaborative[C]//2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025: 1-6.

[26] Zhao, Fengyi "Development Design and Signal Processing Algorithm Optimization of Traditional Chinese Medicine Pulse Acquisition System Based on CP301 Sensor." Advances in Computer, Signals and Systems (2024), 8(6): 106-111