Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

DTMIC: Deep transfer learning for malware image classification

S Kumar, B Janet - Journal of Information Security and Applications, 2022 - Elsevier
In the ever-changing cyber threat landscape, evolving malware threats demand a new
technique for their detection. This paper puts forward a strategy for distinguishing malware …

Continuous learning for android malware detection

Y Chen, Z Ding, D Wagner - 32nd USENIX Security Symposium …, 2023 - usenix.org
Machine learning methods can detect Android malware with very high accuracy. However,
these classifiers have an Achilles heel, concept drift: they rapidly become out of date and …

Efficient and robust malware detection based on control flow traces using deep neural networks

W Qiang, L Yang, H ** - Computers & Security, 2022 - Elsevier
Nowadays, the rapid growth of the number and variety of malware brings great security
challenges. Machine learning has become a mainstream tool for effective malware …

Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance

S Dambra, Y Han, S Aonzo, P Kotzias, A Vitale… - Proceedings of the …, 2023 - dl.acm.org
Many studies have proposed machine-learning (ML) models for malware detection and
classification, reporting an almost-perfect performance. However, they assemble ground …

[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review

S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection

P Dodia, M AlSabah, O Alrawi, T Wang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Tor~\citetor is the most widely used anonymous communication network with millions of
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …

Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning

B Molina-Coronado, U Mori, A Mendiburu… - Computers & …, 2023 - Elsevier
As in other cybersecurity areas, machine learning (ML) techniques have emerged as a
promising solution to detect Android malware. In this sense, many proposals employing a …