Deep learning for android malware defenses: a systematic literature review

Y Liu, C Tantithamthavorn, L Li, Y Liu - ACM Computing Surveys, 2022 - dl.acm.org
Malicious applications (particularly those targeting the Android platform) pose a serious
threat to developers and end-users. Numerous research efforts have been devoted to …

Deep learning for zero-day malware detection and classification: a survey

F Deldar, M Abadi - ACM Computing Surveys, 2023 - dl.acm.org
Zero-day malware is malware that has never been seen before or is so new that no anti-
malware software can catch it. This novelty and the lack of existing mitigation strategies …

Trustworthy graph neural networks: Aspects, methods and trends

H Zhang, B Wu, X Yuan, S Pan, H Tong… - arXiv preprint arXiv …, 2022 - arxiv.org
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications like …

Adversarial attack and defense on graph data: A survey

L Sun, Y Dou, C Yang, K Zhang, J Wang… - … on Knowledge and …, 2022 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …

DMalNet: Dynamic malware analysis based on API feature engineering and graph learning

C Li, Z Cheng, H Zhu, L Wang, Q Lv, Y Wang, N Li… - Computers & …, 2022 - Elsevier
Abstract Application Programming Interfaces (APIs) are widely considered a useful data
source for dynamic malware analysis to understand the behavioral characteristics of …

Attrition: Attacking static hardware trojan detection techniques using reinforcement learning

V Gohil, H Guo, S Patnaik, J Rajendran - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …

Obfuscation-Resilient Android Malware Analysis Based on Complementary Features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

{AIRS}: Explanation for Deep Reinforcement Learning based Security Applications

J Yu, W Guo, Q Qin, G Wang, T Wang… - 32nd USENIX Security …, 2023 - usenix.org
Recently, we have witnessed the success of deep reinforcement learning (DRL) in many
security applications, ranging from malware mutation to selfish blockchain mining. Like all …

Efficient query-based attack against ML-based Android malware detection under zero knowledge setting

P He, Y Xia, X Zhang, S Ji - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The widespread adoption of the Android operating system has made malicious Android
applications an appealing target for attackers. Machine learning-based (ML-based) Android …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …