Reinforcement learning based adversarial malware example generation against black-box detectors

F Zhong, P Hu, G Zhang, H Li, X Cheng - Computers & Security, 2022 - Elsevier
Recent advances in machine learning offer attractive tools for sophisticated adversaries. An
attacker could transform malware into its adversarial version but retain its malicious …

Evolving malware variants as antigens for antivirus systems

R Murali, P Thangavel, CS Velayutham - Expert Systems with Applications, 2023 - Elsevier
This paper proposes MAGE—A Malware Antigen Generating Evolutionary algorithm that is
capable of generating unseen variants of a given source malware. MAGE evolves malware …

Indicadores de compromiso (IOC) para detección de amenazas en la seguridad informática con enfoque en el código malicioso

JG Ponce Larreategui - 2021 - dspace.ups.edu.ec
Las amenazas informáticas evolucionan en el tiempo con ataques sofisticados, el vector de
ataque más utilizado es la utilización de Malware para acceder a su objetivo sin …

Malware Persistence and Obfuscation: An Analysis on Concealed Strategies

MU Rana, MA Shah, O Ellahi - 2021 26th International …, 2021 - ieeexplore.ieee.org
In a globalized world, the term malware is like a mysterious computer program that spreads
violence and sows the downsizing of an operating system. Malware is often associated with …

Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach.

TQ Dam, NT Nguyen, TV Le, TD Le… - Journal of Universal …, 2024 - search.ebscohost.com
In recent years, the rapid evolution of ransomware has led to the development of numerous
techniques designed to evade traditional malware detection methods. To address this issue …

Adapting novelty towards generating antigens for antivirus systems

R Murali, CS Velayutham - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
It is well known that anti-malware scanners depend on malware signatures to identify
malware. However, even minor modifications to malware code structure results in a change …

[PDF][PDF] Analyzing Image Malware with OSINTs after Steganography using Symmetric Key Algorithm

AK Fauziyyah, R Adrian, S Alam - Sinkron: jurnal dan penelitian …, 2023 - jurnal.polgan.ac.id
Steganography is the practice of hiding a message or information within another file, such as
an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly …

Detection of Malicious URLs in Twitter

V Abhijith, CPS Sravan, DV Raju… - … and Smart Electrical …, 2021 - ieeexplore.ieee.org
With spam filtering techniques have been improved in social websites like G mail.,
spammers find their place in other famous social platforms like Twitter, Facebook. Therefore …

A Dropper Remover Tool

MAH bin Mohd Shukri… - … And Computer Science, 2023 - publisher.uthm.edu.my
All devices need protection to prevent any data being breach. Antivirus create specifically to
help, prevent and remove malware. Dropper is one of malware that usually called payload …

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools

I Kennedy, A Bandara, B Price - arXiv preprint arXiv:2010.07188, 2020 - arxiv.org
Following a series of high profile miscarriages of justice in the UK linked to questionable
expert evidence, the post of the Forensic Science Regulator was created in 2008. The main …