Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

Malgraph: Hierarchical graph neural networks for robust windows malware detection

X Ling, L Wu, W Deng, Z Qu, J Zhang… - … -IEEE Conference on …, 2022 - ieeexplore.ieee.org
With the ever-increasing malware threats, malware detection plays an indispensable role in
protecting information systems. Although tremendous research efforts have been made …

[HTML][HTML] Leveraging explainable AI for enhanced decision making in humanitarian logistics: An Adversarial CoevoluTION (ACTION) framework

S Nguyen, G O'Keefe, S Arisian, K Trentelman… - International journal of …, 2023 - Elsevier
This study examines the potential of AI-enabled wargames to enhance strategic decision-
making in humanitarian assistance and disaster relief (HADR). We introduce an Adversarial …

[PDF][PDF] A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild

X Ling, Z Wu, B Wang, W Deng, J Wu, S Ji… - 33rd USENIX Security …, 2024 - usenix.org
A Wolf in Sheep’s Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based
Windows Malware Detection in th Page 1 Institute of Software, Chinese Academy of Sciences A …

MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors

X Chen, L Cui, H Wen, Z Li, H Zhu… - 2023 53rd Annual …, 2023 - ieeexplore.ieee.org
The API call sequence based malware detectors have proven to be promising, especially
when incorporated with deep neural networks (DNNs). Several adversarial attack methods …

Defense against adversarial malware using robust classifier: DAM-ROC

SG Selvaganapathy, S Sadasivam - Sādhanā, 2022 - Springer
Malware authors focus on deceiving and evading Anti Malware Engines (AME). Evasion
attacks take in malware samples and modify those samples to by-pass ml based AME …

Intelligent malware defenses

A Nadeem, V Rimmer, W Joosen, S Verwer - Security and artificial …, 2022 - Springer
With rapidly evolving threat landscape surrounding malware, intelligent defenses based on
machine learning are paramount. In this chapter, we review the literature proposed in the …

A Method for Summarizing and Classifying Evasive Malware

H Yin, B Lou, P Reiher - … of the 26th International Symposium on …, 2023 - dl.acm.org
Ever since the earliest days of the Internet, malware has been a problem for computers.
Since then, this problem's severity has only increased, with important organizations like …

Memory-efficient detection of large-scale obfuscated malware

Y Wang, M Zhang - International Journal of Wireless and …, 2024 - inderscienceonline.com
Obfuscation techniques are frequently used in malicious programs to evade detection.
However, current effective methods often require much memory space during training. This …

[图书][B] Detecting Mimicry Attacks in Windows Malware

H Yin - 2023 - search.proquest.com
Ever since the earliest days of the Internet, malware has been a problem for computers.
Since then, this problem's severity has only increased, with important organizations like …