For malware detection, current state-of-the-art research concentrates on machine learning techniques. Binary n-gram OpCode features are commonly used for malicious code identification and classification with high accuracy. Binary OpCode modification is much more difficult than modification of image pixels. Traditional adversarial perturbation methods could not be applied on OpCode directly. In this paper, we propose a bidirectional universal adversarial learning method for effective binary OpCode perturbation from both benign and malicious perspectives. Benign features are those OpCodes that represent benign behaviours, while malicious features are OpCodes for malicious behaviours. From a large dataset of benign and malicious binary applica...
Malware can be defined as any type of malicious code that has the potential to harm a computer or ne...
Abstract: The recent growth in Internet usage has motivated the creation of new malicious code for v...
Malicious software authors have shifted their focus from illegal and clearly malicious software to p...
Adversarial learning has previously demonstrated effectiveness as a tool for improving performance i...
Abstract. The recent growth in network usage has motivated the creation of new malicious code for va...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
Recently, malicious software are gaining exponential growth due to the innumerable obfuscations of e...
Malware is a serious risk to any software application whether it is standalone or over the network. ...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Machine learning classification models are vulnerable to adversarial examples -- effective input-spe...
We present a new algorithm to train a robust malware detector. Malware is a prolific problem and mal...
Network security has become a growing concern within the popularity and development of the Internet....
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
The use of machine learning (ML) has become an established practice in the realm of malware classific...
Malware can be defined as any type of malicious code that has the potential to harm a computer or ne...
Abstract: The recent growth in Internet usage has motivated the creation of new malicious code for v...
Malicious software authors have shifted their focus from illegal and clearly malicious software to p...
Adversarial learning has previously demonstrated effectiveness as a tool for improving performance i...
Abstract. The recent growth in network usage has motivated the creation of new malicious code for va...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
Recently, malicious software are gaining exponential growth due to the innumerable obfuscations of e...
Malware is a serious risk to any software application whether it is standalone or over the network. ...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Machine learning classification models are vulnerable to adversarial examples -- effective input-spe...
We present a new algorithm to train a robust malware detector. Malware is a prolific problem and mal...
Network security has become a growing concern within the popularity and development of the Internet....
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
The use of machine learning (ML) has become an established practice in the realm of malware classific...
Malware can be defined as any type of malicious code that has the potential to harm a computer or ne...
Abstract: The recent growth in Internet usage has motivated the creation of new malicious code for v...
Malicious software authors have shifted their focus from illegal and clearly malicious software to p...