Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …
operating systems and various file formats. To defend against ever-increasing and ever …
Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems
J Liu, M Nogueira, J Fernandes… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Machine Learning (ML) models are susceptible to adversarial samples that appear as
normal samples but have some imperceptible noise added to them with the intention of …
normal samples but have some imperceptible noise added to them with the intention of …
[HTML][HTML] Malware threat affecting financial organization analysis using machine learning approach
Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies
in the finance industry and their clients. Its key aim is to steal victims' online money-lending …
in the finance industry and their clients. Its key aim is to steal victims' online money-lending …
Functionality-preserving black-box optimization of adversarial windows malware
Windows malware detectors based on machine learning are vulnerable to adversarial
examples, even if the attacker is only given black-box query access to the model. The main …
examples, even if the attacker is only given black-box query access to the model. The main …
Mab-malware: A reinforcement learning framework for blackbox generation of adversarial malware
Modern commercial antivirus systems increasingly rely on machine learning (ML) to keep up
with the rampant inflation of new malware. However, it is well-known that machine learning …
with the rampant inflation of new malware. However, it is well-known that machine learning …
Obfuscation-resilient android malware analysis based on complementary features
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
[HTML][HTML] Evadedroid: A practical evasion attack on machine learning for black-box android malware detection
H Bostani, V Moonsamy - Computers & Security, 2024 - Elsevier
Over the last decade, researchers have extensively explored the vulnerabilities of Android
malware detectors to adversarial examples through the development of evasion attacks; …
malware detectors to adversarial examples through the development of evasion attacks; …
Challenges and pitfalls in malware research
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …
research questions arose, such as how to make malware research reproducible, how to …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …