A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding

J Zhang, Z Qin, H Yin, L Ou, K Zhang - Computers & Security, 2019 - Elsevier
Being able to detect malware variants is a critical problem due to the potential damages and
the fast paces of new malware variations. According to surveys from McAfee and Symantec …

Adversarial machine learning in malware detection: Arms race between evasion attack and defense

L Chen, Y Ye, T Bourlai - 2017 European intelligence and …, 2017 - ieeexplore.ieee.org
Since malware has caused serious damages and evolving threats to computer and Internet
users, its detection is of great interest to both anti-malware industry and researchers. In …

Gotcha-sly malware! scorpion a metagraph2vec based malware detection system

Y Fan, S Hou, Y Zhang, Y Ye… - Proceedings of the 24th …, 2018 - dl.acm.org
Due to its severe damages and threats to the security of the Internet and computing devices,
malware detection has caught the attention of both anti-malware industry and researchers …

Securedroid: Enhancing security of machine learning-based detection against adversarial android malware attacks

L Chen, S Hou, Y Ye - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
With smart phones being indispensable in people's everyday life, Android malware has
posed serious threats to their security, making its detection of utmost concern. To protect …

A survey on cross-architectural IoT malware threat hunting

AD Raju, IY Abualhaol, RS Giagone, Y Zhou… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, the increase in non-Windows malware threats had turned the focus of the
cybersecurity community. Research works on hunting Windows PE-based malwares are …

Dalvik opcode graph based android malware variants detection using global topology features

J Zhang, Z Qin, K Zhang, H Yin, J Zou - IEEE Access, 2018 - ieeexplore.ieee.org
Since Android has become the dominator of smartphone operating system market with a
share of 86.8%, the number of Android malicious applications are increasing rapidly as well …

MalSensor: Fast and Robust Windows Malware Classification

H Zhao, Y Wu, D Zou, Y Liu, H ** - ACM Transactions on Software …, 2024 - dl.acm.org
Driven by the substantial profits, the evolution of Portable Executable (PE) malware has
posed persistent threats. PE malware classification has been an important research field …

Web Scale Graph Mining for Cyber Threat Intelligence

S Freitas, A Gharib - arxiv preprint arxiv:2411.06239, 2024 - arxiv.org
Defending against today's increasingly sophisticated and large-scale cyberattacks demands
accurate, real-time threat intelligence. Traditional approaches struggle to scale, integrate …

Automatic application identification from billions of files

K Soska, C Gates, KA Roundy, N Christin - Proceedings of the 23rd ACM …, 2017 - dl.acm.org
Understanding how to group a set of binary files into the piece of software they belong to is
highly desirable for software profiling, malware detection, or enterprise audits, among many …