Deep learning for android malware defenses: a systematic literature review

Y Liu, C Tantithamthavorn, L Li, Y Liu - ACM Computing Surveys, 2022 - dl.acm.org
Malicious applications (particularly those targeting the Android platform) pose a serious
threat to developers and end-users. Numerous research efforts have been devoted to …

Deep learning for zero-day malware detection and classification: A survey

F Deldar, M Abadi - ACM Computing Surveys, 2023 - dl.acm.org
Zero-day malware is malware that has never been seen before or is so new that no anti-
malware software can catch it. This novelty and the lack of existing mitigation strategies …

Trustworthy graph neural networks: Aspects, methods and trends

H Zhang, B Wu, X Yuan, S Pan, H Tong… - arXiv preprint arXiv …, 2022 - arxiv.org
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications like …

Adversarial attack and defense on graph data: A survey

L Sun, Y Dou, C Yang, K Zhang, J Wang… - … on Knowledge and …, 2022 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …

DMalNet: Dynamic malware analysis based on API feature engineering and graph learning

C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li… - Computers & …, 2022 - Elsevier
Abstract Application Programming Interfaces (APIs) are widely considered a useful data
source for dynamic malware analysis to understand the behavioral characteristics of …

A survey on malware detection with graph representation learning

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Attrition: Attacking static hardware trojan detection techniques using reinforcement learning

V Gohil, H Guo, S Patnaik, J Rajendran - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …

Pad: Towards principled adversarial malware detection against evasion attacks

D Li, S Cui, Y Li, J Xu, F Xiao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) techniques can facilitate the automation of mal icious soft ware
(malware for short) detection, but suffer from evasion attacks. Many studies counter such …