The emerging threat of ai-driven cyber attacks: A review

B Guembe, A Azeta, S Misra, VC Osamor… - Applied Artificial …, 2022 - Taylor & Francis
Cyberattacks are becoming more sophisticated and ubiquitous. Cybercriminals are
inevitably adopting Artificial Intelligence (AI) techniques to evade the cyberspace and cause …

Yamme: a yara-byte-signatures metamorphic mutation engine

A Coscia, V Dentamaro, S Galantucci… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …

Auditing anti-malware tools by evolving android malware and dynamic loading technique

Y Xue, G Meng, Y Liu, TH Tan, H Chen… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Although a previous paper shows that existing anti-malware tools (AMTs) may have high
detection rate, the report is based on existing malware and thus it does not imply that AMTs …

A survey on artificial intelligence in malware as next-generation threats

CT Thanh, I Zelinka - Mendel, 2019 - ib-b2b.test.infv.eu
Recent developments in Artificial intelligence (AI) have a vast transformative potential for
both cybersecurity defenders and cybercriminals. Anti-malware solutions adopt intelligent …

Mystique: Evolving android malware for auditing anti-malware tools

G Meng, Y Xue, C Mahinthan, A Narayanan… - Proceedings of the 11th …, 2016 - dl.acm.org
In the arms race of attackers and defenders, the defense is usually more challenging than
the attack due to the unpredicted vulnerabilities and newly emerging attacks every day …

A novel method for detecting future generations of targeted and metamorphic malware based on genetic algorithm

D Javaheri, P Lalbakhsh, M Hosseinzadeh - IEEE access, 2021 - ieeexplore.ieee.org
This paper presents a novel solution for detecting rare and mutating malware programs and
provides a strategy to address the scarcity of datasets for modeling these types of malware …

On the effectiveness of perturbations in generating evasive malware variants

B Jin, J Choi, JB Hong, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Malware variants are generated using various evasion techniques to bypass malware
detectors, so it is important to understand what properties make them evade malware …

Effectiveness of android obfuscation on evading anti-malware

M Chua, V Balachandran - Proceedings of the eighth ACM conference …, 2018 - dl.acm.org
Obfuscation techniques have been conventionally used for legitimate applications, including
preventing application reverse engineering, tampering and protecting intellectual property. A …

Evolving malware variants as antigens for antivirus systems

R Murali, P Thangavel, CS Velayutham - Expert Systems with Applications, 2023 - Elsevier
This paper proposes MAGE—A Malware Antigen Generating Evolutionary algorithm that is
capable of generating unseen variants of a given source malware. MAGE evolves malware …

Stochastic modeling of self-evolving botnets with vulnerability discovery

T Kudo, T Kimura, Y Inoue, H Aman, K Hirata - Computer Communications, 2018 - Elsevier
Abstract Machine learning techniques have been actively studied and achieved significant
performance improvements in various kinds of tasks. While we benefit from such techniques …