Rebooting research on detecting repackaged android apps: Literature review and benchmark
Repackaging is a serious threat to the Android ecosystem as it deprives app developers of
their benefits, contributes to spreading malware on users' devices, and increases the …
their benefits, contributes to spreading malware on users' devices, and increases the …
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey
Initial penetration is one of the first steps of an Advanced Persistent Threat (APT) attack, and
it is considered one of the most significant means of initiating cyber-attacks aimed at …
it is considered one of the most significant means of initiating cyber-attacks aimed at …
AVclass: A Tool for Massive Malware Labeling
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …
applications such as triage, lineage, and for building reference datasets in turn used for …
Understanding linux malware
For the past two decades, the security community has been fighting malicious programs for
Windows-based operating systems. However, the recent surge in adoption of embedded …
Windows-based operating systems. However, the recent surge in adoption of embedded …
BODMAS: An open dataset for learning based temporal analysis of PE malware
We describe and release an open PE malware dataset called BODMAS to facilitate research
efforts in machine learning based malware analysis. By closely examining existing open PE …
efforts in machine learning based malware analysis. By closely examining existing open PE …
Automatic analysis of malware behavior using machine learning
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …
systems. The amount and diversity of its variants render classic security defenses ineffective …
When malware is packin'heat; limits of machine learning classifiers based on static analysis features
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …
increase the detection rate of anti-malware software, as they automate the creation of …
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Malware can be defined as any type of malicious code that has the potential to harm a
computer or network. The volume of malware is growing faster every year and poses a …
computer or network. The volume of malware is growing faster every year and poses a …
AMAL: high-fidelity, behavior-based automated malware analysis and classification
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
Classifying malware represented as control flow graphs using deep graph convolutional neural network
Malware have been one of the biggest cyber threats in the digital world for a long time.
Existing machine learning based malware classification methods rely on handcrafted …
Existing machine learning based malware classification methods rely on handcrafted …