Deep learning for android malware defenses: a systematic literature review
Malicious applications (particularly those targeting the Android platform) pose a serious
threat to developers and end-users. Numerous research efforts have been devoted to …
threat to developers and end-users. Numerous research efforts have been devoted to …
Deep learning for zero-day malware detection and classification: A survey
Zero-day malware is malware that has never been seen before or is so new that no anti-
malware software can catch it. This novelty and the lack of existing mitigation strategies …
malware software can catch it. This novelty and the lack of existing mitigation strategies …
Trustworthy graph neural networks: Aspects, methods and trends
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications like …
methods for diverse real-world scenarios, ranging from daily applications like …
Adversarial attack and defense on graph data: A survey
Deep neural networks (DNNs) have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
Abstract Application Programming Interfaces (APIs) are widely considered a useful data
source for dynamic malware analysis to understand the behavioral characteristics of …
source for dynamic malware analysis to understand the behavioral characteristics of …
A survey on malware detection with graph representation learning
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …
complexity of malware. Traditional detection methods based on signatures and heuristics …
Obfuscation-resilient android malware analysis based on complementary features
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Attrition: Attacking static hardware trojan detection techniques using reinforcement learning
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …
bypass the security of critical infrastructures. Although researchers have proposed many …
Pad: Towards principled adversarial malware detection against evasion attacks
Machine Learning (ML) techniques can facilitate the automation of mal icious soft ware
(malware for short) detection, but suffer from evasion attacks. Many studies counter such …
(malware for short) detection, but suffer from evasion attacks. Many studies counter such …