Malware is a growing threat to the digital world. The first step to managing this threat is malware detection and classification. While traditional techniques rely on static or dynamic analysis of malware, the generation of these features requires expert knowledge. Function call graphs (FCGs) consist of program functions as their nodes and their interprocedural calls as their edges, providing a wealth of knowledge that can be utilized to classify malware without feature extraction that requires experts. This project treats malware classification as a graph classification problem, setting node features using the Local Degree Profile (LDP) model and using different graph neural networks (GNN) to generate embeddings for each graph which can th...
To prevent detection, attackers frequently design systems to rearrange and rewrite their malware aut...
With the widespread usage of Android smartphones in our daily lives, the Android platform has become...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
Malware is a growing threat to the digital world. The first step to managing this threat is malware ...
Preprint, submitted to ACM Computing Surveys on March 2023. For any suggestions or improvements, ple...
We propose a malware classification system that is shown to be robust to some common intra-procedura...
Cavazos, JohnGraph-structured data is used in many domains to represent complex objects, such as the...
This paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) wit...
Malware are developed for various types of malicious attacks, e.g., to gain access to a user’s priva...
As the security landscape evolves over time, where thousands of species of malicious codes are seen ...
Malware applications create huge monetary damages and represent a menace for people. Mitigating the ...
Android is the most dominant operating system in the mobile ecosystem. As expected, this trend did n...
Malicious software, widely known as malware, is one of the biggest threats to our interconnected soc...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...
The manual methods to create detection rules are no longer prac- tical in the anti-malware product s...
To prevent detection, attackers frequently design systems to rearrange and rewrite their malware aut...
With the widespread usage of Android smartphones in our daily lives, the Android platform has become...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...
Malware is a growing threat to the digital world. The first step to managing this threat is malware ...
Preprint, submitted to ACM Computing Surveys on March 2023. For any suggestions or improvements, ple...
We propose a malware classification system that is shown to be robust to some common intra-procedura...
Cavazos, JohnGraph-structured data is used in many domains to represent complex objects, such as the...
This paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) wit...
Malware are developed for various types of malicious attacks, e.g., to gain access to a user’s priva...
As the security landscape evolves over time, where thousands of species of malicious codes are seen ...
Malware applications create huge monetary damages and represent a menace for people. Mitigating the ...
Android is the most dominant operating system in the mobile ecosystem. As expected, this trend did n...
Malicious software, widely known as malware, is one of the biggest threats to our interconnected soc...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...
The manual methods to create detection rules are no longer prac- tical in the anti-malware product s...
To prevent detection, attackers frequently design systems to rearrange and rewrite their malware aut...
With the widespread usage of Android smartphones in our daily lives, the Android platform has become...
Malware stands for malicious software. It is software that is designed with a harmful intent. A malw...