A survey of android malware detection with deep neural models

J Qiu, J Zhang, W Luo, L Pan, S Nepal… - ACM Computing Surveys …, 2020 - dl.acm.org
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

Robust intelligent malware detection using deep learning

R Vinayakumar, M Alazab, KP Soman… - IEEE …, 2019 - ieeexplore.ieee.org
Security breaches due to attacks by malicious software (malware) continue to escalate
posing a major security concern in this digital age. With many computer users, corporations …

Deep ground truth analysis of current android malware

F Wei, Y Li, S Roy, X Ou, W Zhou - … , DIMVA 2017, Bonn, Germany, July 6-7 …, 2017 - Springer
To build effective malware analysis techniques and to evaluate new detection tools, up-to-
date datasets reflecting the current Android malware landscape are essential. For such …

[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.

Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee… - NDSS, 2020 - kangkookjee.io
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …

Understanding linux malware

E Cozzi, M Graziano, Y Fratantonio… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
For the past two decades, the security community has been fighting malicious programs for
Windows-based operating systems. However, the recent surge in adoption of embedded …

BODMAS: An open dataset for learning based temporal analysis of PE malware

L Yang, A Ciptadi, I Laziuk… - 2021 IEEE Security …, 2021 - ieeexplore.ieee.org
We describe and release an open PE malware dataset called BODMAS to facilitate research
efforts in machine learning based malware analysis. By closely examining existing open PE …

Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

Sok: The challenges, pitfalls, and perils of using hardware performance counters for security

S Das, J Werner, M Antonakakis… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …