Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance

S Dambra, Y Han, S Aonzo, P Kotzias, A Vitale… - Proceedings of the …, 2023 - dl.acm.org
Many studies have proposed machine-learning (ML) models for malware detection and
classification, reporting an almost-perfect performance. However, they assemble ground …

Enhancing Malware Classification via Self-Similarity Techniques

F Zhong, Q Hu, Y Jiang, J Huang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Despite continuous advancements in defense mechanisms, attackers often find ways to
circumvent security measures. Windows operating systems, in particular, are vulnerable due …

Unmasking the veiled: A comprehensive analysis of android evasive malware

A Ruggia, D Nisi, S Dambra, A Merlo… - Proceedings of the 19th …, 2024 - dl.acm.org
Since Android is the most widespread operating system, malware targeting it poses a severe
threat to the security and privacy of millions of users and is increasing from year to year. The …

Comparing malware evasion theory with practice: results from interviews with expert analysts

MY Wong, M Landen, F Li, F Monrose… - Twentieth Symposium on …, 2024 - usenix.org
Malware analysis is the process of identifying whether certain software is malicious and
determining its capabilities. Unfortunately, malware authors have developed increasingly …

Nova: Generative Language Models for Assembly Code with Hierarchical Attention and Contrastive Learning

N Jiang, C Wang, K Liu, X Xu, L Tan… - arxiv preprint arxiv …, 2023 - arxiv.org
Binary code analysis is the foundation of crucial tasks in the security domain; thus building
effective binary analysis techniques is more important than ever. Large language models …

DREAM: Combating Concept Drift with Explanatory Detection and Adaptation in Malware Classification

Y He, J Lei, Z Qin, K Ren - arxiv preprint arxiv:2405.04095, 2024 - arxiv.org
Deep learning-based malware classifiers face significant challenges due to concept drift.
The rapid evolution of malware, especially with new families, can depress classification …

What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments

M Botacin - Proceedings of the 27th International Symposium on …, 2024 - dl.acm.org
Malware analysis tasks are as fundamental for modern cybersecurity as they are
challenging to perform. More than depending on any tool capability, malware analysis tasks …

Unveiling Malware Patterns: A Self-analysis Perspective

F Zhong, Q Hu, Y Jiang, J Huang, X Cheng - arxiv preprint arxiv …, 2025 - arxiv.org
The widespread usage of Microsoft Windows has unfortunately led to a surge in malware,
posing a serious threat to the security and privacy of millions of users. In response, the …

Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection

S Gupta, F Lu, A Barlow, E Raff… - … Conference on Big …, 2024 - ieeexplore.ieee.org
A strategy used by malicious actors is to" live off the land," where benign systems and tools
already available on a victim's systems are used and repurposed for the malicious actor's …

Symbol Preference Aware Generative Models for Recovering Variable Names from Stripped Binary

X Xu, Z Zhang, Z Su, Z Huang, S Feng, Y Ye… - arxiv preprint arxiv …, 2023 - arxiv.org
Decompilation aims to recover the source code form of a binary executable. It has many
security applications such as malware analysis, vulnerability detection and code hardening …