Survey of machine learning techniques for malware analysis
Coping with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …
complexity and volume. One of the most common approaches in literature is using machine …
Malware classification and composition analysis: A survey of recent developments
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …
complexity of malware design and the recent advancement of communication and …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
[PDF][PDF] Malware detection by eating a whole exe
In this work we introduce malware detection from raw byte sequences as a fruitful research
area to the larger machine learning community. Building a neural network for such a …
area to the larger machine learning community. Building a neural network for such a …
Deep neural network based malware detection using two dimensional binary program features
In this paper we introduce a deep neural network based malware detection system that
Invincea has developed, which achieves a usable detection rate at an extremely low false …
Invincea has developed, which achieves a usable detection rate at an extremely low false …
AVclass: A Tool for Massive Malware Labeling
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …
applications such as triage, lineage, and for building reference datasets in turn used for …
A {Large-scale} analysis of the security of embedded firmwares
As embedded systems are more than ever present in our society, their security is becoming
an increasingly important issue. However, based on the results of many recent analyses of …
an increasingly important issue. However, based on the results of many recent analyses of …
AMAL: high-fidelity, behavior-based automated malware analysis and classification
A Mohaisen, O Alrawi, M Mohaisen - computers & security, 2015 - Elsevier
This paper introduces AMAL, an automated and behavior-based malware analysis and
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
labeling system that addresses shortcomings of the existing systems. AMAL consists of two …
Fuzzy hash of behavioral results
A Mesdaq, PL Westin III - US Patent 9,294,501, 2016 - Google Patents
(51) Int. Cl.(57) ABSTRACT G06F II/00(2006.01) A computerized method is described in
which a received G06F 2/4(2006.01) object is analyzed by a malicious content detection …
which a received G06F 2/4(2006.01) object is analyzed by a malicious content detection …
Understanding android app piggybacking: A systematic study of malicious code grafting
The Android packaging model offers ample opportunities for malware writers to piggyback
malicious code in popular apps, which can then be easily spread to a large user base …
malicious code in popular apps, which can then be easily spread to a large user base …