Towards adversarial malware detection: Lessons learned from PDF-based attacks

D Maiorca, B Biggio, G Giacinto - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Malware still constitutes a major threat in the cybersecurity landscape, also due to the
widespread use of infection vectors such as documents. These infection vectors hide …

Arms race in adversarial malware detection: A survey

D Li, Q Li, Y Ye, S Xu - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Malicious software (malware) is a major cyber threat that has to be tackled with Machine
Learning (ML) techniques because millions of new malware examples are injected into …

Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

A survey on adversarial attacks for malware analysis

K Aryal, M Gupta, M Abdelsalam, P Kunwar… - IEEE …, 2024 - ieeexplore.ieee.org
Machine learning-based malware analysis approaches are widely researched and
deployed in critical infrastructures for detecting and classifying evasive and growing …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

[PDF][PDF] PDF Malware Detection based on Stacking Learning.

M Issakhani, P Victor, A Tekeoglu, AH Lashkari - ICISSP, 2022 - pdfs.semanticscholar.org
Over the years, Portable Document Format (PDF) has become the most popular content
presenting format among users due to its flexibility and easy-to-work features. However …

A survey on the evolution of fileless attacks and detection techniques

S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2024 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …

On the correctness of metadata-based SBOM generation: A differential analysis approach

S Yu, W Song, X Hu, H Yin - 2024 54th Annual IEEE/IFIP …, 2024 - ieeexplore.ieee.org
Amidst rising concerns of software supply chain attacks, the Software Bill of Materials
(SBOM) has emerged as a pivotal tool, offering a detailed listing of software components to …

A feature-vector generative adversarial network for evading PDF malware classifiers

Y Li, Y Wang, Y Wang, L Ke, Y Tan - Information Sciences, 2020 - Elsevier
Abstract Cyber-Physical Systems (CPS) are increasingly utilizing machine learning (ML)
algorithms to resolve different control and decision making problems. CPS are traditionally …

Malware detection in pdf and office documents: A survey

P Singh, S Tapaswi, S Gupta - Information Security Journal: A …, 2020 - Taylor & Francis
In 2018, with the internet being treated as a utility on equal grounds as clean water or air, the
underground malicious software economy is flourishing with an influx of growth and …