Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26 Program AnalysisDynamic AnalysisDynamic Vulnerability Management 2022.10.26 2025.05.28 Literature Database
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25 WatermarkingDynamic AnalysisAdversarial Training 2022.10.25 2025.05.28 Literature Database
An Efficient Multi-Step Framework for Malware Packing Identification Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17 Program AnalysisMalware Propagation MeansDynamic Analysis 2022.08.17 2025.05.28 Literature Database
Ransomware Classification and Detection With Machine Learning Algorithms Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02 Backdoor AttackDynamic AnalysisEvaluation Method 2022.07.02 2025.05.28 Literature Database
Leveraging Machine Learning for Ransomware Detection Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04 Cyber ThreatHybrid AnalysisDynamic Analysis 2022.06.04 2025.05.28 Literature Database
Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13 Dynamic AnalysisCryptographyFeature Extraction Method 2022.03.13 2025.05.28 Literature Database
Vulnerability Detection in Open Source Software: An Introduction Authors: Stuart Millar | Published: 2022-03-06 Dynamic AnalysisVulnerability detectionStatic Analysis 2022.03.06 2025.05.28 Literature Database
DDUO: General-Purpose Dynamic Analysis for Differential Privacy Authors: Chike Abuah, Alex Silence, David Darais, Joe Near | Published: 2021-03-16 Data DependencyPrivacy Risk ManagementDynamic Analysis 2021.03.16 2025.05.28 Literature Database
The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques Authors: Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang | Published: 2018-05-28 | Updated: 2018-05-30 Program AnalysisDynamic AnalysisInformation Security 2018.05.28 2025.05.28 Literature Database
Survey of Machine Learning Techniques for Malware Analysis Authors: Daniele Ucci, Leonardo Aniello, Roberto Baldoni | Published: 2017-10-23 | Updated: 2018-11-26 Malware Detection MethodDynamic AnalysisAnalysis of Detection Methods 2017.10.23 2025.05.28 Literature Database