Tarallo: Evading Behavioral Malware Detectors in the Problem Space Authors: Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero | Published: 2025-06-03 API SecurityDynamic Analysis MethodBehavior Analysis Method 2025.06.03 2025.06.05 Literature Database
CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03 Prompt InjectionDynamic Analysis MethodWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes Authors: Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti, Massimo Merro | Published: 2025-05-28 Data Origins and EvolutionModel DesignDynamic Analysis Method 2025.05.28 2025.05.30 Literature Database
NeuDep: Neural Binary Memory Dependence Analysis Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray | Published: 2022-10-04 Memory Management MethodModel DesignDynamic Analysis Method 2022.10.04 2025.05.28 Literature Database
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan | Published: 2022-04-04 Dynamic Analysis MethodMachine LearningImage Feature Extraction 2022.04.04 2025.05.28 Literature Database
On the (Un)Reliability of Privacy Policies in Android Apps Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo | Published: 2020-04-18 Privacy TechniqueDynamic Analysis MethodMachine Learning 2020.04.18 2025.05.28 Literature Database
Neurlux: Dynamic Malware Analysis Without Feature Engineering Authors: Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna | Published: 2019-10-24 Model ArchitectureDynamic Analysis MethodPerformance Evaluation Metrics 2019.10.24 2025.05.28 Literature Database
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2017-03-31 Online Malware DetectionDynamic Analysis MethodPerformance Evaluation Method 2017.03.31 2025.05.28 Literature Database