A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
RS-Del: Edit distance robustness certificates for sequence classifiers via randomized deletion
Randomized smoothing is a leading approach for constructing classifiers that are certifiably
robust against adversarial examples. Existing work on randomized smoothing has focused …
robust against adversarial examples. Existing work on randomized smoothing has focused …
Motif: A malware reference dataset with ground truth family labels
Malware family classification is a significant issue with public safety and research
implications that has been hindered by the high cost of expert labels. The vast majority of …
implications that has been hindered by the high cost of expert labels. The vast majority of …
Automated machine learning for deep learning based malware detection
Deep learning (DL) has proven to be effective in detecting sophisticated malware that is
constantly evolving. Even though deep learning has alleviated the feature engineering …
constantly evolving. Even though deep learning has alleviated the feature engineering …
Adversarial Binaries: AI-guided Instrumentation Methods for Malware Detection Evasion
Adversarial binaries are executable files that have been altered without loss of function by
an AI agent in order to deceive malware detection systems. Progress in this emergent vein of …
an AI agent in order to deceive malware detection systems. Progress in this emergent vein of …
Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection
Malware detection is an interesting and valuable domain to work in because it has
significant real-world impact and unique machine-learning challenges. We investigate …
significant real-world impact and unique machine-learning challenges. We investigate …
Universal backdoor attack on deep neural networks for malware detection
Y Zhang, F Feng, Z Liao, Z Li, S Yao - Applied Soft Computing, 2023 - Elsevier
Backdoor attacks targeting the deep neural network are flourishing recently and are more
stealthy than existing adversarial attacks. A deep understanding of the backdoor attacks …
stealthy than existing adversarial attacks. A deep understanding of the backdoor attacks …
Recasting self-attention with holographic reduced representations
In recent years, self-attention has become the dominant paradigm for sequence modeling in
a variety of domains. However, in domains with very long sequence lengths the $\mathcal …
a variety of domains. However, in domains with very long sequence lengths the $\mathcal …
Certified robustness of static deep learning-based malware detectors against patch and append attacks
Machine learning-based (ML) malware detectors have been shown to be susceptible to
adversarial malware examples. Given the vulnerability of deep learning detectors to small …
adversarial malware examples. Given the vulnerability of deep learning detectors to small …
Intra-section code cave injection for adversarial evasion attacks on windows pe malware file
Windows malware is predominantly available in cyberspace and is a prime target for
deliberate adversarial evasion attacks. Although researchers have investigated the …
deliberate adversarial evasion attacks. Although researchers have investigated the …