A survey of android malware detection with deep neural models
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …
security research. Deep learning models have many advantages over traditional Machine …
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …
operating systems and various file formats. To defend against ever-increasing and ever …
Robust intelligent malware detection using deep learning
Security breaches due to attacks by malicious software (malware) continue to escalate
posing a major security concern in this digital age. With many computer users, corporations …
posing a major security concern in this digital age. With many computer users, corporations …
Deep ground truth analysis of current android malware
To build effective malware analysis techniques and to evaluate new detection tools, up-to-
date datasets reflecting the current Android malware landscape are essential. For such …
date datasets reflecting the current Android malware landscape are essential. For such …
[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …
developed and employed various attack vectors to make a malware much stealthier than …
Understanding linux malware
For the past two decades, the security community has been fighting malicious programs for
Windows-based operating systems. However, the recent surge in adoption of embedded …
Windows-based operating systems. However, the recent surge in adoption of embedded …
BODMAS: An open dataset for learning based temporal analysis of PE malware
We describe and release an open PE malware dataset called BODMAS to facilitate research
efforts in machine learning based malware analysis. By closely examining existing open PE …
efforts in machine learning based malware analysis. By closely examining existing open PE …
Measuring and modeling the label dynamics of online {Anti-Malware} engines
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …
used by researchers for malware annotation and system evaluation. Since different engines …
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …
decade. These counters can be used to monitor and measure events that occur at the CPU …
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …