Towards adversarial malware detection: Lessons learned from PDF-based attacks

D Maiorca, B Biggio, G Giacinto - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Malware still constitutes a major threat in the cybersecurity landscape, also due to the
widespread use of infection vectors such as documents. These infection vectors hide …

Detection of malicious PDF files and directions for enhancements: A state-of-the art survey

N Nissim, A Cohen, C Glezer, Y Elovici - Computers & Security, 2015 - Elsevier
Initial penetration is one of the first steps of an Advanced Persistent Threat (APT) attack, and
it is considered one of the most significant means of initiating cyber-attacks aimed at …

Intriguing properties of adversarial ml attacks in the problem space

F Pierazzi, F Pendlebury, J Cortellazzi… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
Recent research efforts on adversarial ML have investigated problem-space attacks,
focusing on the generation of real evasive objects in domains where, unlike images, there is …

[PDF][PDF] Automatically evading classifiers

W Xu, Y Qi, D Evans - Proceedings of the 2016 network and distributed …, 2016 - inforsec.org
Machine learning is widely used to develop classifiers for security tasks. However, the
robustness of these methods against motivated adversaries is uncertain. In this work, we …

Towards making systems forget with machine unlearning

Y Cao, J Yang - 2015 IEEE symposium on security and privacy, 2015 - ieeexplore.ieee.org
Today's systems produce a rapidly exploding amount of data, and the data further derives
more data, forming a complex data propagation network that we call the data's lineage …

Poisoning attacks against support vector machines

B Biggio, B Nelson, P Laskov - arXiv preprint arXiv:1206.6389, 2012 - arxiv.org
We investigate a family of poisoning attacks against Support Vector Machines (SVM). Such
attacks inject specially crafted training data that increases the SVM's test error. Central to the …

Practical evasion of a learning-based classifier: A case study

N Šrndić, P Laskov - 2014 IEEE symposium on security and …, 2014 - ieeexplore.ieee.org
Learning-based classifiers are increasingly used for detection of various forms of malicious
data. However, if they are deployed online, an attacker may attempt to evade them by …

{TESSERACT}: Eliminating experimental bias in malware classification across space and time

F Pendlebury, F Pierazzi, R Jordaney, J Kinder… - 28th USENIX security …, 2019 - usenix.org
Is Android malware classification a solved problem? Published F1 scores of up to 0.99
appear to leave very little room for improvement. In this paper, we argue that results are …

Malicious PDF detection using metadata and structural features

C Smutz, A Stavrou - Proceedings of the 28th annual computer security …, 2012 - dl.acm.org
Owed to their versatile functionality and widespread adoption, PDF documents have
become a popular avenue for user exploitation ranging from large-scale phishing attacks to …

[PDF][PDF] Detection of malicious pdf files based on hierarchical document structure

N Šrndic, P Laskov - Proceedings of the 20th annual network & distributed …, 2013 - Citeseer
Malicious PDF files remain a real threat, in practice, to masses of computer users, even after
several high-profile security incidents. In spite of a series of a security patches issued by …