Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …
operating systems and various file formats. To defend against ever-increasing and ever …
SoK: cryptojacking malware
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
DTMIC: Deep transfer learning for malware image classification
In the ever-changing cyber threat landscape, evolving malware threats demand a new
technique for their detection. This paper puts forward a strategy for distinguishing malware …
technique for their detection. This paper puts forward a strategy for distinguishing malware …
Continuous learning for android malware detection
Machine learning methods can detect Android malware with very high accuracy. However,
these classifiers have an Achilles heel, concept drift: they rapidly become out of date and …
these classifiers have an Achilles heel, concept drift: they rapidly become out of date and …
Efficient and robust malware detection based on control flow traces using deep neural networks
W Qiang, L Yang, H ** - Computers & Security, 2022 - Elsevier
Nowadays, the rapid growth of the number and variety of malware brings great security
challenges. Machine learning has become a mainstream tool for effective malware …
challenges. Machine learning has become a mainstream tool for effective malware …
Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
Many studies have proposed machine-learning (ML) models for malware detection and
classification, reporting an almost-perfect performance. However, they assemble ground …
classification, reporting an almost-perfect performance. However, they assemble ground …
[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …
operated through the Internet, enable the transfer of data among objects or people …
Obfuscation-resilient android malware analysis based on complementary features
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
Exposing the rat in the tunnel: Using traffic analysis for tor-based malware detection
Tor~\citetor is the most widely used anonymous communication network with millions of
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …
daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds of …
Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning
As in other cybersecurity areas, machine learning (ML) techniques have emerged as a
promising solution to detect Android malware. In this sense, many proposals employing a …
promising solution to detect Android malware. In this sense, many proposals employing a …