Learning Type Inference for Enhanced Dataflow Analysis Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04 WatermarkingDynamic AnalysisEvaluation Method 2023.10.01 2025.05.28 Literature Database
Behavioural Reports of Multi-Stage Malware Authors: Marcus Carpenter, Chunbo Luo | Published: 2023-01-30 Data CollectionModel Performance EvaluationDynamic Analysis 2023.01.30 2025.05.28 Literature Database
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26 Program AnalysisDynamic AnalysisDynamic Vulnerability Management 2022.10.26 2025.05.28 Literature Database
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25 WatermarkingDynamic AnalysisAdversarial Training 2022.10.25 2025.05.28 Literature Database
An Efficient Multi-Step Framework for Malware Packing Identification Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17 Program AnalysisMalware Propagation MeansDynamic Analysis 2022.08.17 2025.05.28 Literature Database
Ransomware Classification and Detection With Machine Learning Algorithms Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02 Backdoor AttackDynamic AnalysisEvaluation Method 2022.07.02 2025.05.28 Literature Database
Leveraging Machine Learning for Ransomware Detection Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04 Cyber ThreatHybrid AnalysisDynamic Analysis 2022.06.04 2025.05.28 Literature Database
Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13 Dynamic AnalysisCryptographyFeature Extraction Method 2022.03.13 2025.05.28 Literature Database
Vulnerability Detection in Open Source Software: An Introduction Authors: Stuart Millar | Published: 2022-03-06 Dynamic AnalysisVulnerability detectionStatic Analysis 2022.03.06 2025.05.28 Literature Database
DDUO: General-Purpose Dynamic Analysis for Differential Privacy Authors: Chike Abuah, Alex Silence, David Darais, Joe Near | Published: 2021-03-16 Data DependencyPrivacy Risk ManagementDynamic Analysis 2021.03.16 2025.05.28 Literature Database