Adversarial learning has previously demonstrated effectiveness as a tool for improving performance in deep learning models trained on limited data. In this work, we apply adversarial learning to the constrained, discrete domain of opcode-based deep malware detection. We do this by developing a deep learning model for detecting maliciousness in sequences of opcodes, and using this model in order to alter sequences of code from the dataset in minimal ways to create example sequences which are misclassified by the original model. We augment our original training dataset with these adversarial examples, thereby improving the classification accuracy on unseen sequences of opcodes. Using adversarial examples to supplement our training data, we de...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
In the past few years, malware classification techniques have shifted from shallow traditional machi...
Deep-learning technologies have shown impressive performance on many tasks in recent years. However,...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
For malware detection, current state-of-the-art research concentrates on machine learning techniques...
The use of machine learning (ML) has become an established practice in the realm of malware classific...
Adversarial examples are inputs to a machine learning system intentionally crafted by an attacker to...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
Machine learning classification models are vulnerable to adversarial examples -- effective input-spe...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
Machine learning models exhibit vulnerability to adversarial examples i.e., artificially created inp...
With intentional feature perturbations to a deep learning model, the adversary generates an adversar...
Machine learning and deep learning in particular has been recently used to successfully address many...
Machine learning is widely used for detecting and classifying malware. Unfortunately, machine learni...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
In the past few years, malware classification techniques have shifted from shallow traditional machi...
Deep-learning technologies have shown impressive performance on many tasks in recent years. However,...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
For malware detection, current state-of-the-art research concentrates on machine learning techniques...
The use of machine learning (ML) has become an established practice in the realm of malware classific...
Adversarial examples are inputs to a machine learning system intentionally crafted by an attacker to...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
Machine learning classification models are vulnerable to adversarial examples -- effective input-spe...
Over the last decade, machine learning systems have achieved state-of-the-art performance in many fi...
Current state-of-the-art research for tackling the problem of malware detection and classification i...
Machine learning models exhibit vulnerability to adversarial examples i.e., artificially created inp...
With intentional feature perturbations to a deep learning model, the adversary generates an adversar...
Machine learning and deep learning in particular has been recently used to successfully address many...
Machine learning is widely used for detecting and classifying malware. Unfortunately, machine learni...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
In the past few years, malware classification techniques have shifted from shallow traditional machi...
Deep-learning technologies have shown impressive performance on many tasks in recent years. However,...