Burning the adversarial bridges: Robust windows malware detection against binary-level mutations

A Abusnaina, Y Wang, S Arora, K Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
Toward robust malware detection, we explore the attack surface of existing malware
detection systems. We conduct root-cause analyses of the practical binary-level black-box …

xr-droid: A Benchmark Dataset for AR/VR and Security Applications

A Alghamdi, A Alkinoon, A Alghuried… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The development of metaverses and virtual worlds on various platforms, including mobile
devices, has led to the growth of applications in virtual reality (VR) and augmented reality …

A threat modeling framework for IoT-Based botnet attacks

H Jin, GH Jeon, HWA Choi, S Jeon, JT Seo - Heliyon, 2024 - cell.com
Abstract Internet of Things (IoT) devices are much closer to users than personal computers
used in traditional computing environments. Due to prevalence of IoT devices, even if they …

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

A Alghureid, D Mohaisen - arXiv preprint arXiv:2408.03441, 2024 - arxiv.org
This paper explores the vulnerability of machine learning models, specifically Random
Forest, Decision Tree, and K-Nearest Neighbors, to very simple single-feature adversarial …

MalFusion: Simple String Manipulations Confuse Malware Detection

M Faloutsos - 2024 IFIP Networking Conference (IFIP …, 2024 - ieeexplore.ieee.org
We explore how a hacker confuse malware detection engines with minimal effort. As our
overarching contribution, we show that such engines can be easily manipulated to …

Comprehensive Analysis of the Intersection Between Cryptocurrency and Infrastructure Security

A Adeniran - 2024 - stars.library.ucf.edu
Cryptocurrencies are experiencing a significant surge, with the total valuation surpassing
two trillion US dollars at specific points. This remarkable growth is underscored by the …