Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
Many studies have proposed machine-learning (ML) models for malware detection and
classification, reporting an almost-perfect performance. However, they assemble ground …
classification, reporting an almost-perfect performance. However, they assemble ground …
Enhancing Malware Classification via Self-Similarity Techniques
Despite continuous advancements in defense mechanisms, attackers often find ways to
circumvent security measures. Windows operating systems, in particular, are vulnerable due …
circumvent security measures. Windows operating systems, in particular, are vulnerable due …
Unmasking the veiled: A comprehensive analysis of android evasive malware
Since Android is the most widespread operating system, malware targeting it poses a severe
threat to the security and privacy of millions of users and is increasing from year to year. The …
threat to the security and privacy of millions of users and is increasing from year to year. The …
Comparing malware evasion theory with practice: results from interviews with expert analysts
MY Wong, M Landen, F Li, F Monrose… - Twentieth Symposium on …, 2024 - usenix.org
Malware analysis is the process of identifying whether certain software is malicious and
determining its capabilities. Unfortunately, malware authors have developed increasingly …
determining its capabilities. Unfortunately, malware authors have developed increasingly …
Nova: Generative Language Models for Assembly Code with Hierarchical Attention and Contrastive Learning
N Jiang, C Wang, K Liu, X Xu, L Tan… - arxiv preprint arxiv …, 2023 - arxiv.org
Binary code analysis is the foundation of crucial tasks in the security domain; thus building
effective binary analysis techniques is more important than ever. Large language models …
effective binary analysis techniques is more important than ever. Large language models …
DREAM: Combating Concept Drift with Explanatory Detection and Adaptation in Malware Classification
Y He, J Lei, Z Qin, K Ren - arxiv preprint arxiv:2405.04095, 2024 - arxiv.org
Deep learning-based malware classifiers face significant challenges due to concept drift.
The rapid evolution of malware, especially with new families, can depress classification …
The rapid evolution of malware, especially with new families, can depress classification …
What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments
M Botacin - Proceedings of the 27th International Symposium on …, 2024 - dl.acm.org
Malware analysis tasks are as fundamental for modern cybersecurity as they are
challenging to perform. More than depending on any tool capability, malware analysis tasks …
challenging to perform. More than depending on any tool capability, malware analysis tasks …
Unveiling Malware Patterns: A Self-analysis Perspective
The widespread usage of Microsoft Windows has unfortunately led to a surge in malware,
posing a serious threat to the security and privacy of millions of users. In response, the …
posing a serious threat to the security and privacy of millions of users. In response, the …
Living off the Analyst: Harvesting Features from Yara Rules for Malware Detection
A strategy used by malicious actors is to" live off the land," where benign systems and tools
already available on a victim's systems are used and repurposed for the malicious actor's …
already available on a victim's systems are used and repurposed for the malicious actor's …
Symbol Preference Aware Generative Models for Recovering Variable Names from Stripped Binary
X Xu, Z Zhang, Z Su, Z Huang, S Feng, Y Ye… - arxiv preprint arxiv …, 2023 - arxiv.org
Decompilation aims to recover the source code form of a binary executable. It has many
security applications such as malware analysis, vulnerability detection and code hardening …
security applications such as malware analysis, vulnerability detection and code hardening …