Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware

X Zhang, Y Zhang, M Zhong, D Ding, Y Cao… - Proceedings of the …, 2020 - dl.acm.org
Machine learning (ML) classifiers have been widely deployed to detect Android malware,
but at the same time the application of ML classifiers also faces an emerging problem. The …

Android malware family classification and analysis: Current status and future directions

F Alswaina, K Elleithy - Electronics, 2020 - mdpi.com
Android receives major attention from security practitioners and researchers due to the influx
number of malicious applications. For the past twelve years, Android malicious applications …

Measuring and modeling the label dynamics of online {Anti-Malware} engines

S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song… - 29th USENIX Security …, 2020 - usenix.org
VirusTotal provides malware labels from a large set of anti-malware engines, and is heavily
used by researchers for malware annotation and system evaluation. Since different engines …

Characterizing cryptocurrency exchange scams

P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo… - Computers & …, 2020 - Elsevier
As the indispensable trading platforms of the ecosystem, hundreds of cryptocurrency
exchanges are emerging to facilitate the trading of digital assets. While, it also attracts the …

On the impact of sample duplication in machine-learning-based android malware detection

Y Zhao, L Li, H Wang, H Cai, TF Bissyandé… - ACM Transactions on …, 2021 - dl.acm.org
Malware detection at scale in the Android realm is often carried out using machine learning
techniques. State-of-the-art approaches such as DREBIN and MaMaDroid are reported to …

Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets

J Gray, D Sgandurra, L Cavallaro… - ACM Computing …, 2024 - dl.acm.org
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …

Obfuscation-resilient android malware analysis based on complementary features

C Gao, M Cai, S Yin, G Huang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …

Familial clustering for weakly-labeled android malware using hybrid representation learning

Y Zhang, Y Sui, S Pan, Z Zheng, B Ning… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Labeling malware or malware clustering is important for identifying new security threats,
triaging and building reference datasets. The state-of-the-art Android malware clustering …

Fast & Furious: On the modelling of malware detection as an evolving data stream

F Ceschin, M Botacin, HM Gomes, F Pinagé… - Expert Systems with …, 2023 - Elsevier
Malware is a major threat to computer systems and imposes many challenges to cyber
security. Targeted threats, such as ransomware, cause millions of dollars in losses every …