Survey of machine learning techniques for malware analysis

D Ucci, L Aniello, R Baldoni - Computers & Security, 2019 - Elsevier
Coping with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …

Malware classification and composition analysis: A survey of recent developments

A Abusitta, MQ Li, BCM Fung - Journal of Information Security and …, 2021 - Elsevier
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

[PDF][PDF] Malware detection by eating a whole exe

E Raff, J Barker, J Sylvester, R Brandon… - Workshops at the thirty …, 2018 - cdn.aaai.org
In this work we introduce malware detection from raw byte sequences as a fruitful research
area to the larger machine learning community. Building a neural network for such a …

Deep neural network based malware detection using two dimensional binary program features

J Saxe, K Berlin - 2015 10th international conference on …, 2015 - ieeexplore.ieee.org
In this paper we introduce a deep neural network based malware detection system that
Invincea has developed, which achieves a usable detection rate at an extremely low false …

AVclass: A Tool for Massive Malware Labeling

M Sebastián, R Rivera, P Kotzias… - Research in Attacks …, 2016 - Springer
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …

A {Large-scale} analysis of the security of embedded firmwares

A Costin, J Zaddach, A Francillon… - 23rd USENIX security …, 2014 - usenix.org
As embedded systems are more than ever present in our society, their security is becoming
an increasingly important issue. However, based on the results of many recent analyses of …

AMAL: high-fidelity, behavior-based automated malware analysis and classification

A Mohaisen, O Alrawi, M Mohaisen - computers & security, 2015 - Elsevier
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …

Fuzzy hash of behavioral results

A Mesdaq, PL Westin III - US Patent 9,294,501, 2016 - Google Patents
(51) Int. Cl.(57) ABSTRACT G06F II/00(2006.01) A computerized method is described in
which a received G06F 2/4(2006.01) object is analyzed by a malicious content detection …

Understanding android app piggybacking: A systematic study of malicious code grafting

L Li, D Li, TF Bissyandé, J Klein… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The Android packaging model offers ample opportunities for malware writers to piggyback
malicious code in popular apps, which can then be easily spread to a large user base …