Deep learning methods are being increasingly widely used in static malware detection field because they can summarize the feature of malware and its variants that have never appeared before. But similar to the picture recognition model, the static malware detection model based on deep learning is also vulnerable to the interference of adversarial samples. When the input feature vectors of the malware detection model is based on static features of Windows PE (Portable Executable, PE) file, the model is vulnerable to gradient-based attacks. Regarding the issue above, a method of adversarial sample generation is proposed, which can summarize the blind spots of the original detection model. However, the existing malware adversarial sample gener...
This repository contains all benign samples used in article "DeepDetectNet vs RLAttackNet: An Advers...
Industrial Internet of Things (IIoT) deploys edge devices to act as intermediaries between sensors a...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
There are two main components of malware analysis. One is static malware analysis and the other is d...
This paper primarily evaluates the efficacy of shallow and deep networks to statically detect malici...
Over the years, malware is getting stronger and growing to become a powerful threat in the Informati...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
Rapid development of the internet leads the malware to become one of the most significant threads no...
As malware continues to evolve, deep learning models are increasingly used for malware detection and...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Computer security requires malware detection. Recent research manually uncovers hazardous features u...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
This repository contains all benign samples used in article "DeepDetectNet vs RLAttackNet: An Advers...
Industrial Internet of Things (IIoT) deploys edge devices to act as intermediaries between sensors a...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...
There are two main components of malware analysis. One is static malware analysis and the other is d...
This paper primarily evaluates the efficacy of shallow and deep networks to statically detect malici...
Over the years, malware is getting stronger and growing to become a powerful threat in the Informati...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constant...
Rapid development of the internet leads the malware to become one of the most significant threads no...
As malware continues to evolve, deep learning models are increasingly used for malware detection and...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Computer security requires malware detection. Recent research manually uncovers hazardous features u...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
This repository contains all benign samples used in article "DeepDetectNet vs RLAttackNet: An Advers...
Industrial Internet of Things (IIoT) deploys edge devices to act as intermediaries between sensors a...
As cybersecurity detectors increasingly rely on machine learning mechanisms, attacks to these defens...