Using Static and Dynamic Malware features to perform Malware Ascription Authors: Jashanpreet Singh Sraw, Keshav Kumar | Published: 2021-12-05 Malware Detection MethodMachine Learning AlgorithmStatic Analysis 2021.12.05 2025.05.28 Literature Database
Node-wise Hardware Trojan Detection Based on Graph Learning Authors: Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa | Published: 2021-12-04 | Updated: 2022-03-16 Graph Representation LearningTopology AnalysisMalware Detection Method 2021.12.04 2025.05.28 Literature Database
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03 Prompt InjectionMalware Detection MethodAdversarial Attack Methods 2021.12.03 2025.05.28 Literature Database
Benchmark Static API Call Datasets for Malware Family Classification Authors: Berkant Düzgün, Aykut Çayır, Ferhat Demirkıran, Ceyda Nur Kahya, Buket Gençaydın, Hasan Dağ | Published: 2021-11-30 | Updated: 2022-08-04 Dataset evaluationMalware Detection MethodStatic Analysis 2021.11.30 2025.05.28 Literature Database
Living-Off-The-Land Command Detection Using Active Learning Authors: Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt | Published: 2021-11-30 Active LearningBackdoor AttackMalware Detection Method 2021.11.30 2025.05.28 Literature Database
MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment Authors: Shoumik Saha, Sadia Afroz, Atif Rahman | Published: 2021-11-28 | Updated: 2024-01-12 Program AnalysisMalware Detection MethodStatic Analysis 2021.11.28 2025.05.28 Literature Database
Statically Detecting Adversarial Malware through Randomised Chaining Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Malware Detection MethodAdversarial attackDefense Method 2021.11.28 2025.05.28 Literature Database
Dissecting Malware in the Wild Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Backdoor AttackMalware Detection MethodAdversarial attack 2021.11.28 2025.05.28 Literature Database
Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh | Published: 2021-11-27 Malware Detection MethodReinforcement LearningDeep Reinforcement Learning 2021.11.27 2025.05.28 Literature Database
A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22 Malware Detection MethodAdversarial attackMalware Detection with Limited Samples 2021.11.22 2025.05.28 Literature Database