Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

Deep learning for zero-day malware detection and classification: a survey

F Deldar, M Abadi - ACM Computing Surveys, 2023 - dl.acm.org
Zero-day malware is malware that has never been seen before or is so new that no anti-
malware software can catch it. This novelty and the lack of existing mitigation strategies …

Black-box Adversarial Example Attack towards {FCG} Based Android Malware Detection under Incomplete Feature Information

H Li, Z Cheng, B Wu, L Yuan, C Gao, W Yuan… - 32nd USENIX Security …, 2023 - usenix.org
The function call graph (FCG) based Android malware detection methods have recently
attracted increasing attention due to their promising performance. However, these methods …

Structural attack against graph based android malware detection

K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li… - Proceedings of the …, 2021 - dl.acm.org
Malware detection techniques achieve great success with deeper insight into the semantics
of malware. Among existing detection techniques, function call graph (FCG) based methods …

A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Attrition: Attacking static hardware trojan detection techniques using reinforcement learning

V Gohil, H Guo, S Patnaik, J Rajendran - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can
bypass the security of critical infrastructures. Although researchers have proposed many …

Sometimes, you aren't what you do: Mimicry attacks against provenance graph host intrusion detection systems

A Goyal, X Han, G Wang, A Bates - 30th Network and Distributed System …, 2023 - par.nsf.gov
Reliable methods for host-layer intrusion detection remained an open problem within
computer security. Recent research has recast intrusion detection as a provenance graph …

A closer look into transformer-based code intelligence through code transformation: Challenges and opportunities

Y Li, S Qi, C Gao, Y Peng, D Lo, Z Xu… - arXiv preprint arXiv …, 2022 - arxiv.org
Transformer-based models have demonstrated state-of-the-art performance in many
intelligent coding tasks such as code comment generation and code completion. Previous …

Malgne: Enhancing the performance and efficiency of cfg-based malware detector by graph node embedding in low dimension space

H Peng, J Yang, D Zhao, X Xu, Y Pu… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The rich semantic information in Control Flow Graphs (CFGs) of executable programs has
made Graph Neural Networks (GNNs) a key focus for malware detection. However, existing …

ELAMD: An ensemble learning framework for adversarial malware defense

J Chen, C Yuan, J Li, D Tian, R Ma, X Jia - Journal of Information Security …, 2023 - Elsevier
Abstract Machine learning-based methods have been widely used in malware detection.
However, recent studies show that models based on machine learning (or deep learning) …