[HTML][HTML] A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A survey of adversarial attack and defense methods for malware classification in cyber security

S Yan, J Ren, W Wang, L Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Inadequacies of large language model benchmarks in the era of generative artificial intelligence

TR McIntosh, T Susnjak, T Liu, P Watters… - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid rise in popularity of Large Language Models (LLMs) with emerging capabilities
has spurred public curiosity to evaluate and compare different LLMs, leading many …

Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware

X Zhang, Y Zhang, M Zhong, D Ding, Y Cao… - Proceedings of the …, 2020 - dl.acm.org
Machine learning (ML) classifiers have been widely deployed to detect Android malware,
but at the same time the application of ML classifiers also faces an emerging problem. The …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data

I Almomani, R Qaddoura, M Habib, S Alsoghyer… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, Ransomware has been a critical threat that attacks smartphones.
Ransomware is a kind of malware that blocks the mobile's system and prevents the user of …

A Systematical and longitudinal study of evasive behaviors in windows malware

N Galloro, M Polino, M Carminati, A Continella… - Computers & …, 2022 - Elsevier
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

Motif: A malware reference dataset with ground truth family labels

RJ Joyce, D Amlani, C Nicholas, E Raff - Computers & Security, 2023 - Elsevier
Malware family classification is a significant issue with public safety and research
implications that has been hindered by the high cost of expert labels. The vast majority of …