Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

DawnGNN: Documentation augmented windows malware detection using graph neural network

P Feng, L Gai, L Yang, Q Wang, T Li, N **, J Ma - Computers & Security, 2024 - Elsevier
Abstract Application Program Interface (API) calls are widely used in dynamic Windows
malware analysis to characterize the run-time behavior of malware. Researchers have …

Kairos: Practical intrusion detection and investigation using whole-system provenance

Z Cheng, Q Lv, J Liang, Y Wang, D Sun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …

A novel deep framework for dynamic malware detection based on API sequence intrinsic features

C Li, Q Lv, N Li, Y Wang, D Sun, Y Qiao - Computers & Security, 2022 - Elsevier
Dynamic malware detection executes the software in a secured virtual environment and
monitors its run-time behavior. This technique widely uses API sequence analysis to identify …

Malware reverse engineering with large language model for superior code comprehensibility and ioc recommendations

AQ Williamson, M Beauparlant - 2024 - researchsquare.com
Malware reverse engineering, the process of dissecting malicious software to understand its
functionality and behavior, faces significant challenges due to the complexity and …

Dynamic prototype network based on sample adaptation for few-shot malware detection

Y Chai, L Du, J Qiu, L Yin, Z Tian - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The continuous increase and spread of malware have caused immeasurable losses to
social enterprises and even the country, especially unknown malware. Most existing …

DMalNet: Dynamic malware analysis based on API feature engineering and graph learning

C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li… - Computers & …, 2022 - Elsevier
Abstract Application Programming Interfaces (APIs) are widely considered a useful data
source for dynamic malware analysis to understand the behavioral characteristics of …

Android malware detection based on multi-head squeeze-and-excitation residual network

H Zhu, W Gu, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
The popularity and flexibility of the Android platform makes it the primary target of malicious
attackers. The behaviors of malware, such as malicious charges and privacy theft, pose …

A multi-view feature fusion approach for effective malware classification using Deep Learning

R Chaganti, V Ravi, TD Pham - Journal of information security and …, 2023 - Elsevier
The number of malware infected machines from all over the world has been growing day by
day. New malware variants appear in the wild to evade the malware detection and …

A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …