Leveraging Attention Graph Isomorphism for Efficient Cyber Threat Intelligence Search
A novel malware behavior search technique based on graph isomorphism at the attention layers of Transformer models can outperform existing methods and aid in real-world attack forensics.