A survey on malware detection with graph representation learning
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …
complexity of malware. Traditional detection methods based on signatures and heuristics …
Cruparamer: Learning on parameter-augmented api sequences for malware detection
X Chen, Z Hao, L Li, L Cui, Y Zhu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Learning on execution behaviour, ie, sequences of API calls, is proven to be effective in
malware detection. In this paper, we present CruParamer, a deep neural network based …
malware detection. In this paper, we present CruParamer, a deep neural network based …
A Systematical and longitudinal study of evasive behaviors in windows malware
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …
instrumented environments play a crucial role in dynamically analyzing malware samples …
[HTML][HTML] RanSAP: An open dataset of ransomware storage access patterns for training machine learning models
M Hirano, R Hodota, R Kobayashi - Forensic Science International: Digital …, 2022 - Elsevier
Ransomware, the malicious software that encrypts user files to demand a ransom payment,
is one of the most common and persistent threats. Cyber-criminals create new ransomware …
is one of the most common and persistent threats. Cyber-criminals create new ransomware …
Evading {Provenance-Based}{ML} detectors with adversarial system actions
K Mukherjee, J Wiedemeier, T Wang, J Wei… - 32nd USENIX Security …, 2023 - usenix.org
We present PROVNINJA, a framework designed to generate adversarial attacks that aim to
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …
OS events and on applying pattern matching procedures on binaries to detect malware. In …
Encrypted malware traffic detection via graph-based network analysis
Malicious activities on the Internet continue to grow in volume and damage, posing a serious
risk to society. Malware with remote control capabilities is considered one of the most …
risk to society. Malware with remote control capabilities is considered one of the most …
Api2vec: Learning representations of api sequences for malware detection
Analyzing malware based on API call sequence is an effective approach as the sequence
reflects the dynamic execution behavior of malware. Recent advancements in deep learning …
reflects the dynamic execution behavior of malware. Recent advancements in deep learning …