" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation

S Bhardwaj, AS Li, M Dave, E Bertino - Computers & Security, 2024 - Elsevier
Many current malware detection methods are based on supervised learning techniques,
which however have certain limitations. First, these techniques require a large amount of …

Boosting neural networks to decompile optimized binaries

Y Cao, R Liang, K Chen, P Hu - … of the 38th annual computer security …, 2022 - dl.acm.org
Decompilation aims to transform a low-level program language (LPL)(eg., binary file) into its
functionally-equivalent high-level program language (HPL)(eg, C/C++). It is a core …

PackGenome: Automatically generating robust YARA rules for accurate malware packer detection

S Li, J Ming, P Qiu, Q Chen, L Liu, H Bao… - Proceedings of the …, 2023 - dl.acm.org
Binary packing, a widely-used program obfuscation style, compresses or encrypts the
original program and then recovers it at runtime. Packed malware samples are pervasive …

Finer: Enhancing state-of-the-art classifiers with feature attribution to facilitate security analysis

Y He, J Lou, Z Qin, K Ren - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Deep learning classifiers achieve state-of-the-art performance in various risk detection
applications. They explore rich semantic representations and are supposed to automatically …

Risk-aware and explainable framework for ensuring guaranteed coverage in evolving hardware trojan detection

R Vishwakarma, A Rezaei - 2023 IEEE/ACM International …, 2023 - ieeexplore.ieee.org
As the semiconductor industry has shifted to a fabless paradigm, the risk of hardware
Trojans being inserted at various stages of production has also increased. Recently, there …

An empirical comparison on the results of different clone detection setups for c-based projects

Y Zhou, J Chen, Y Shi, B Chen… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Code clones have been used in many different software maintenance and evaluation tasks
in practice (eg, change proportion and evolution, refactoring, and vulnerability …

PowerDetector: Malicious PowerShell script family classification based on multi-modal semantic fusion and deep learning

X Yang, G Peng, D Zhang, Y Gao… - China Communications, 2023 - ieeexplore.ieee.org
PowerShell has been widely deployed in fileless malware and advanced persistent threat
(APT) attacks due to its high stealthiness and live-off-the-land technique. However, existing …

SeqNet: An efficient neural network for automatic malware detection

J Xu, W Fu, H Bu, Z Wang, L Ying - arxiv preprint arxiv:2205.03850, 2022 - arxiv.org
Malware continues to evolve rapidly, and more than 450,000 new samples are captured
every day, which makes manual malware analysis impractical. However, existing deep …

PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models

Z Sha, C Zhang, H Wang, Z Gao, B Zhang… - Empirical Software …, 2025 - Springer
Pre-trained models have witnessed significant progress in nature language (including
source code) and binary code comprehension. However, none of them are suitable for …