A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

AVclass: A Tool for Massive Malware Labeling

M Sebastián, R Rivera, P Kotzias… - Research in Attacks …, 2016 - Springer
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …

{xNIDS}: Explaining deep learning-based network intrusion detection systems for active intrusion responses

F Wei, H Li, Z Zhao, H Hu - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
While Deep Learning-based Network Intrusion Detection Systems (DL-NIDS) have recently
been significantly explored and shown superior performance, they are insufficient to actively …

{HorusEye}: A realtime {IoT} malicious traffic detection framework using programmable switches

Y Dong, Q Li, K Wu, R Li, D Zhao, G Tyson… - 32nd USENIX Security …, 2023 - usenix.org
The ever-growing volume of IoT traffic brings challenges to IoT anomaly detection systems.
Existing anomaly detection systems perform all traffic detection on the control plane, which …

On the security of machine learning in malware c&c detection: A survey

J Gardiner, S Nagaraja - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
One of the main challenges in security today is defending against malware attacks. As
trends and anecdotal evidence show, preventing these attacks, regardless of their …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

Efficient signature generation for classifying cross-architecture IoT malware

M Alhanahnah, Q Lin, Q Yan, N Zhang… - 2018 IEEE conference …, 2018 - ieeexplore.ieee.org
Internet-of-Things IoT devices are increasingly targeted Uy adversaries due to their unique
characteristics such as constant online connection, lack of protection, and full integration in …

A survey of machine learning methods and challenges for windows malware classification

E Raff, C Nicholas - arxiv preprint arxiv:2006.09271, 2020 - arxiv.org
Malware classification is a difficult problem, to which machine learning methods have been
applied for decades. Yet progress has often been slow, in part due to a number of unique …

Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks

B Rahbarinia, R Perdisci… - 2015 45th Annual IEEE …, 2015 - ieeexplore.ieee.org
In this paper, we propose Segugio, a novel defense system that allows for efficiently tracking
the occurrence of new malware-control domain names in very large ISP networks. Segugio …