In recent years there has been a shift from heuristics-based malware detection towards machine learning, which proves to be more robust in the current heavily adversarial threat landscape. While we acknowledge machine learning to be better equipped to mine for patterns in the increasingly high amounts of similar-looking files, we also note a remarkable scarcity of the data available for similarity-targeted research. Moreover, we observe that the focus in the few related works falls on quantifying similarity in malware, often overlooking the clean data. This one-sided quantification is especially dangerous in the context of detection bypass. We propose to address the deficiencies in the space of similarity research on binary files, starting ...
How can we find malware source code and establish the similarity, influence, and phylogeny of these ...
We identify a new method for detecting malware within a network that can be processed in linear time...
abstract: Malware forensics is a time-consuming process that involves a significant amount of data c...
This project aims to present the functionality and accuracy of five different machine learning algor...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Malware attack is a never-ending cyber security issue. Since traditional approaches are less efficie...
Malicious software (malware) attacks are on the rise with the explosion of Internet of Things (IoT) ...
Malware analysis and detection continues to be one of the central battlefields for cybersecurity ind...
The number of malware has sharply increased over years, and it caused various damages on computing s...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
Static detection of polymorphic malware variants plays an important role to improve system security....
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
How can we find malware source code and establish the similarity, influence, and phylogeny of these ...
We identify a new method for detecting malware within a network that can be processed in linear time...
abstract: Malware forensics is a time-consuming process that involves a significant amount of data c...
This project aims to present the functionality and accuracy of five different machine learning algor...
Abstract: Similarity metrics, e.g., signatures as used by anti-virus products, are the dominant tech...
Malware attack is a never-ending cyber security issue. Since traditional approaches are less efficie...
Malicious software (malware) attacks are on the rise with the explosion of Internet of Things (IoT) ...
Malware analysis and detection continues to be one of the central battlefields for cybersecurity ind...
The number of malware has sharply increased over years, and it caused various damages on computing s...
Malware is a major security threat confronting computer systems and networks and has increased in sc...
This paper received the Best Paper Award for IWCC 2021International audienceMalware is a primary co...
The goal of this thesis is the analysis of malware strains with the aim to discover relationships in...
Many malicious programs are just previously-seen programs that have had some minor changes made to t...
Static detection of polymorphic malware variants plays an important role to improve system security....
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
How can we find malware source code and establish the similarity, influence, and phylogeny of these ...
We identify a new method for detecting malware within a network that can be processed in linear time...
abstract: Malware forensics is a time-consuming process that involves a significant amount of data c...