A survey on malware detection with graph representation learning

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …

Cruparamer: Learning on parameter-augmented api sequences for malware detection

X Chen, Z Hao, L Li, L Cui, Y Zhu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Learning on execution behaviour, ie, sequences of API calls, is proven to be effective in
malware detection. In this paper, we present CruParamer, a deep neural network based …

A Systematical and longitudinal study of evasive behaviors in windows malware

N Galloro, M Polino, M Carminati, A Continella… - Computers & …, 2022 - Elsevier
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …

[HTML][HTML] RanSAP: An open dataset of ransomware storage access patterns for training machine learning models

M Hirano, R Hodota, R Kobayashi - Forensic Science International: Digital …, 2022 - Elsevier
Ransomware, the malicious software that encrypts user files to demand a ransom payment,
is one of the most common and persistent threats. Cyber-criminals create new ransomware …

Evading {Provenance-Based}{ML} detectors with adversarial system actions

K Mukherjee, J Wiedemeier, T Wang, J Wei… - 32nd USENIX Security …, 2023 - usenix.org
We present PROVNINJA, a framework designed to generate adversarial attacks that aim to
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

M Botacin, MZ Alves, D Oliveira, A Grégio - Expert Systems with …, 2022 - Elsevier
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …

Encrypted malware traffic detection via graph-based network analysis

Z Fu, M Liu, Y Qin, J Zhang, Y Zou, Q Yin, Q Li… - Proceedings of the 25th …, 2022 - dl.acm.org
Malicious activities on the Internet continue to grow in volume and damage, posing a serious
risk to society. Malware with remote control capabilities is considered one of the most …

Api2vec: Learning representations of api sequences for malware detection

L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Analyzing malware based on API call sequence is an effective approach as the sequence
reflects the dynamic execution behavior of malware. Recent advancements in deep learning …