Welcome to Scholar Publishing Group

International Journal of Multimedia Computing, 2025, 6(1); doi: 10.38007/IJMC.2025.060103.

Optimization of Malicious Code Detection Model for Web3.0 Binary Files Based on Convolutional Neural Network and Graph Convolutional Neural Network

Author(s)

Hongjun Wu

Corresponding Author:
Hongjun Wu
Affiliation(s)

Department of AI/ML, Bullpen Labs, Inc, New York, NY, 10044, USA

Abstract

While Web3.0 technology promotes the development of distributed application ecology, binary executable file security threats brought by its open architecture become increasingly prominent. Traditional detection methods are difficult to deal with attack means such as code confusion and control flow camouflage due to their dependence on static feature matching. To this end, we propose a hybrid detection model combining depth map structure analysis and sequence feature mining. The model constructs complementary representation by synchronously analyzing the topological features of the control flow graph and the microscopic operation mode of the instruction sequence. The cyclic structure extraction method is introduced to accurately locate the strongly coupled execution path, and the attention mechanism is used to strengthen the recognition of covert attack patterns. At the same time, a dynamic adversarial training framework is constructed to simulate the code deformation strategy in real attack scenarios to learn the invariance characteristics of attack. Experiments show that the detection accuracy of the model is 3.8 percentage points higher than that of the traditional graph neural network in real data sets, the recognition rate of countersample is 90.6%, and the feature disturbance test shows that the decision stability is increased by 41.2%. The research results can not only effectively detect Web3.0 binary malicious code, but also be applied to blockchain security scenarios such as smart contract audit. It lays a foundation for exploring the dynamic and static feature fusion mechanism to deepen polymorphic attack defense.

Keywords

Web3.0 security, Malicious code detection, Binary, Graph Convolutional Neural network (GCN), Convolutional Neural network (CNN)

Cite This Paper

Hongjun Wu. Optimization of Malicious Code Detection Model for Web3.0 Binary Files Based on Convolutional Neural Network and Graph Convolutional Neural Network. International Journal of Multimedia Computing (2025), Vol. 6, Issue 1: 29-43. https://doi.org/10.38007/IJMC.2025.060103.

References

[1] Jinshuo Zhang, Research on Intelligent Power Electronic Inverter Control System Based on Knowledge Base and Data Driven, Journal of Electrotechnology, Electrical Engineering and Management (2024), 7(3), 69-74

[2] Liu, Boyang. "Design and Application of Experimental Data Management System Integrating Remote Monitoring and Historical Data Analysis." Journal of Electronics and Information Science 9.3 (2024): 160-167.

[3] Zihan Tang, Research on the Application of Joint Optimization Strategy of Energy Storage System and Demand Side Response Based on Tianqun Algorithm in Renewable Energy Grid, Frontiers in Power and Energy Systems, 2024, 3(1), 65-71

[4] Chen, H., Yang, Y., & Shao, C. (2021). Multi-task learning for data-efficient spatiotemporal modeling of tool surface progression in ultrasonic metal welding. Journal of Manufacturing Systems, 58, 306-315.

[5] Peng, Yicheng. "Accurate Construction of Intelligent Investment Advisory System Based on the Integration of AI Algorithms and Financial Regulatory Framework." Academic Journal of Business & Management 6.10 (2024): 104-108.

[6] Varatharajah, Y., Chen, H., Trotter, A., & Iyer, R. K. (2020). A Dynamic Human-in-the-loop Recommender System for Evidence-based Clinical Staging of COVID-19. In HealthRecSys@ RecSys (pp. 21-22).

[7] Fan, Sunjia, et al. "Defense methods against multi-language and multi-intent LLM attacks." International Conference on Algorithms, High Performance Computing, and Artificial Intelligence (AHPCAI 2024). Vol. 13403. SPIE, 2024.  

[8] Yu, Liu "Quantitative Analysis method in Accounting estimation Audit based on risk Identification Model and its Application in Audit quality improvement."Creative Economy (2024), 8(2): 43-48

[9] Xu H. OLAP Technology Financial Statistics Information Platform Based on Big Data Analysis[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 283-293.

[10] Chen, H., Yang, Y., & Shao, C. (2021). Multi-task learning for data-efficient spatiotemporal modeling of tool surface progression in ultrasonic metal welding. Journal of Manufacturing Systems, 58, 306-315.

[11] Fan Y. Credit Rating Optimization Model Based on Deep Q-Network[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 464-475.

[12] Dong, Peng. "Research and Analysis of Financial Crisis Prediction Model Based on the Fusion of Financial and Non-Financial Data with CSO Algorithm." Academic Journal of Business & Management 6.11: 56-60.

[13] Peng, Yicheng. "Development and Design of an Intelligent Financial Asset Management System Based on Big Data Analysis and Kubernetes." Procedia Computer Science 243 (2024): 482-489.

[14] Ma, K., Zhang, N., Mei, X., Feng, C., Hou, W., & Ye, Z. (2024, October). Research on Optimization of Shared Bicycle Scheduling Based on Genetic Algorithm and LSTM. In 2024 IEEE 6th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (pp. 936-940). IEEE.

[15] Tan, Weiyan, Shujia Wu, and Ke Ma. "Freight Volume Prediction for Logistics Sorting Centers Using an Integrated GCN-BiLSTM-Transformer Model." Advances in Computer and Engineering Technology Research 1.4 (2024): 320-324 

[16] Zhang J. Research on Fault Prediction and Health Management System of Railway Tunnel Drilling and Blasting Construction Machinery Based on Machine Learning[J]. International Journal of New Developments in Engineering and Society, 2024, 8(5),70-75

[17] Zhao, Yunpeng(2024). "Research on Credit Debt Liquidity Risk Measurement and Early Warning Based on Machine Learning" Model.Information Systems and Economics,5(5),18-23

[18] Chen, Junyu. "Research on Intelligent Data Mining Technology Based on Geographic Information System." Journal of Computer Science and Artificial Intelligence 2.2 (2025): 12-16.

[19] Xu, Hanyue. "Analysis and Prediction of Financial Stock Risk Value Based On Improved FAST-ICA Algorithm and GARCH Model." Procedia Computer Science 243 (2024): 490-495.

[20] Wang Y. Design and Implementation of a General Data Collection System Architecture Based on Relational Database Technology[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 561-572.

[21] Peng, Yicheng"Development Path and Improvement Suggestions for Traditional Financial Robo-Advisors under AI+Cloud Computing ." Information Systems and Economics (2024), 5(3): 105-111

[22] Liu Y. Optimization of Financial Fraud Detection Algorithm by Combining Variational Autoencoder with Generative Adversarial Networks[C]//2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024: 1-7.

[23] Fan, Yijiao. "Research on Data Asset Feature Analysis and Value Evaluation Strategy Based on Random Forest and BP Neural Network." Academic Journal of Business & Management 6.11 (2024): 42-46.

[24] Zhao, Fengyi "Computer System Security and Power Data Network Integrated Security Strategy Analysis and Optimization." Journal of Network Computing and Applications (2025), 10(1): 14-19

[25] Zhu P. Construction and Experimental Verification[C]//Cyber Security Intelligence and Analytics: The 6th International Conference on Cyber Security Intelligence and Analytics (CSIA 2024), Volume 1. Springer Nature, 2025, 1351: 391.

[26] Zhang, Jinshuo "Optimization of Highway Engineering Design and Data-Driven Decision Support Based on Machine Learning Algorithm." Journal of Network Computing and Applications (2025), 10(1): 8-13

[27] Wang Y. Research on Intelligent Diagnosis Technology of Oil Well Condition Based on Big Data and Deep Learning Model OWDNet[J]. Academic Journal of Architecture and Geotechnical Engineering, 2025, 7(1): 17-22.

[28] Yang J. Application of Multi-model Fusion Deep NLP System in Classification of Brain Tumor Follow-Up Image Reports[C]//The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer Nature Switzerland, 2024: 380-390.

[29] Tang, Zihan. "Research on Resource Planning and Transmission Line Optimization System of US Power Grid Based on GIS Technology." safety 8.5 (2024): 53-59.

[30] Zhao, Yunpeng. "Research on Financial Credit Risk of Manufacturing Enterprises under Heterogeneous Data Based on Machine Learning." Academic Journal of Business & Management 6.11: 214-218.

[31] Wu, Wei. "Combination model optimization and empirical analysis of risk customer prediction in e-commerce platform based on regression model and neural network." Academic Journal of Business Management 6.12 (2024): 127-131.

[32] Zhang Y. Research on Optimization of Engineering Cost Database Based on Big Data and Intelligent Technology[J]. International Journal of New Developments in Engineering and Society, 2024, 8(5).42-47

[33] Huang, Tianyou. "Construction and Application of Financial Risk Warning System for Third-Party Payment Enterprises Based on Z-Score Model and Efficacy Coefficient Method." Academic Journal of Business & Management 6.12 (2024): 121-126.

[34] Dong, Peng. "Performance Evaluation and Interpretation of Non-life Insurance Company Bankruptcy Prediction Model Using LightGBM Algorithm and SHAP Method." Financial Engineering and Risk Management 7.6 (2024): 105-110.

[35] Li, Xuan. "Research on the Review Technology of Building Fire Protection Design Drawings Based on BlM." Frontiers in Science and Engineering 5.2 (2025): 113-118.

[36] Liu, Boyang. "Data Analysis and Model Construction for Crew Fatigue Monitoring Based on Machine Learning Algorithms." optimization 8.5: 48-52.

[37] Li, Bin. "Application of Data Analysis in Climate Policy in Environmental Planning." Frontiers in Science and Engineering 5.2 (2025): 106-112.

[38] Xu, Y. (2024, November). Research on Graph Network Social Recommendation Algorithm Based on AGRU-GNN. In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA) (pp. 910-914). IEEE.

[39] Zhang J. Research on Fault Prediction and Health Management System of Railway Tunnel Drilling and Blasting Construction Machinery Based on Machine Learning[J]. International Journal of New Developments in Engineering and Society, 2024, 8(5),70-75

[40] Wang, Yuxin. "Application and Practice of Sensor Network Based on Deep Learning in Condition Monitoring of Underground Oil Production Equipment." International Journal of Frontiers in Engineering Technology 6.6 (2024).

[41] Shi, Chongwei. "Research on Gene Identification Algorithms Based on Signal Processing Techniques." 2024 6th International Conference on Artificial Intelligence and Computer Applications (ICAICA). IEEE, 2024.