Malware Detection Method

Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning

Authors: Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le | Published: 2021-11-18
Malware Detection Method
Reinforcement Learning
Deep Reinforcement Learning

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

Authors: Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham | Published: 2021-10-06
Steganography Techniques
Malware Detection Method
Performance Evaluation

GANG-MAM: GAN based enGine for Modifying Android Malware

Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27
Software Security
Malware Detection Method
Adversarial attack

Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability

Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21
Malware Detection Method
Adversarial Example
Adversarial attack

Detecting Attacks on IoT Devices using Featureless 1D-CNN

Authors: Arshiya Khan, Chase Cotton | Published: 2021-09-09
Malware Detection Method
Machine Learning
Communication Analysis

Metamorphic Detection of Repackaged Malware

Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27
Malware Detection Method
Feature Interdependence
Feature Extraction Method

Adversarial Robustness with Non-uniform Perturbations

Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29
Malware Detection Method
Adversarial Example
Adversarial Example Detection

SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel

Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29
Watermarking
Malware Detection Method
Hierarchical Classification Methods

MalNet: A Large-Scale Image Database of Malicious Software

Authors: Scott Freitas, Rahul Duggal, Duen Horng Chau | Published: 2021-01-31 | Updated: 2022-09-04
Data Collection
Malware Detection Method
Deep Transfer Learning

A Large-Scale Database for Graph Representation Learning

Authors: Scott Freitas, Yuxiao Dong, Joshua Neil, Duen Horng Chau | Published: 2020-11-16 | Updated: 2021-11-07
Dataset Generation
Performance Evaluation
Malware Detection Method