Malware Detection Method

Online Malware Classification with System-Wide System Calls in Cloud IaaS

Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2022-08-09
Malware Classification
Malware Detection Method
Machine Learning Method

Robust Machine Learning for Malware Detection over Time

Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio | Published: 2022-08-09
Malware Detection Method
Robustness Evaluation
Machine Learning Method

DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic

Authors: Zhi Liu | Published: 2022-08-08
Malware Detection Method
Performance Evaluation
Communication Analysis

Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration

Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18
Malware Detection Method
Transaction Profit and Performance
Funding

Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor

Authors: Manabu Hirano, Ryotaro Kobayashi | Published: 2022-05-27 | Updated: 2022-08-18
Cyber Threat
Data Management System
Malware Detection Method

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs

Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil | Published: 2022-05-26
Network Threat Detection
Malware Detection Method
Malicious URL Analysis

Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning

Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06
Dataset evaluation
Malware Detection Method
Static Analysis

Using Static and Dynamic Malware features to perform Malware Ascription

Authors: Jashanpreet Singh Sraw, Keshav Kumar | Published: 2021-12-05
Malware Detection Method
Machine Learning Algorithm
Static Analysis

Node-wise Hardware Trojan Detection Based on Graph Learning

Authors: Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa | Published: 2021-12-04 | Updated: 2022-03-16
Graph Representation Learning
Topology Analysis
Malware Detection Method

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03
Prompt Injection
Malware Detection Method
Adversarial Attack Methods