Reinforcement learning based adversarial malware example generation against black-box detectors
Recent advances in machine learning offer attractive tools for sophisticated adversaries. An
attacker could transform malware into its adversarial version but retain its malicious …
attacker could transform malware into its adversarial version but retain its malicious …
Evolving malware variants as antigens for antivirus systems
R Murali, P Thangavel, CS Velayutham - Expert Systems with Applications, 2023 - Elsevier
This paper proposes MAGE—A Malware Antigen Generating Evolutionary algorithm that is
capable of generating unseen variants of a given source malware. MAGE evolves malware …
capable of generating unseen variants of a given source malware. MAGE evolves malware …
Indicadores de compromiso (IOC) para detección de amenazas en la seguridad informática con enfoque en el código malicioso
JG Ponce Larreategui - 2021 - dspace.ups.edu.ec
Las amenazas informáticas evolucionan en el tiempo con ataques sofisticados, el vector de
ataque más utilizado es la utilización de Malware para acceder a su objetivo sin …
ataque más utilizado es la utilización de Malware para acceder a su objetivo sin …
Malware Persistence and Obfuscation: An Analysis on Concealed Strategies
In a globalized world, the term malware is like a mysterious computer program that spreads
violence and sows the downsizing of an operating system. Malware is often associated with …
violence and sows the downsizing of an operating system. Malware is often associated with …
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach.
In recent years, the rapid evolution of ransomware has led to the development of numerous
techniques designed to evade traditional malware detection methods. To address this issue …
techniques designed to evade traditional malware detection methods. To address this issue …
Adapting novelty towards generating antigens for antivirus systems
R Murali, CS Velayutham - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
It is well known that anti-malware scanners depend on malware signatures to identify
malware. However, even minor modifications to malware code structure results in a change …
malware. However, even minor modifications to malware code structure results in a change …
[PDF][PDF] Analyzing Image Malware with OSINTs after Steganography using Symmetric Key Algorithm
Steganography is the practice of hiding a message or information within another file, such as
an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly …
an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly …
Detection of Malicious URLs in Twitter
V Abhijith, CPS Sravan, DV Raju… - … and Smart Electrical …, 2021 - ieeexplore.ieee.org
With spam filtering techniques have been improved in social websites like G mail.,
spammers find their place in other famous social platforms like Twitter, Facebook. Therefore …
spammers find their place in other famous social platforms like Twitter, Facebook. Therefore …
A Dropper Remover Tool
MAH bin Mohd Shukri… - … And Computer Science, 2023 - publisher.uthm.edu.my
All devices need protection to prevent any data being breach. Antivirus create specifically to
help, prevent and remove malware. Dropper is one of malware that usually called payload …
help, prevent and remove malware. Dropper is one of malware that usually called payload …
Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
Following a series of high profile miscarriages of justice in the UK linked to questionable
expert evidence, the post of the Forensic Science Regulator was created in 2008. The main …
expert evidence, the post of the Forensic Science Regulator was created in 2008. The main …