Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427242
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Windows Methods on Malware Detection and Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(10 citation statements)
references
References 39 publications
0
10
0
Order By: Relevance
“…From the above section, the rest of the document is devoted to describe and evaluate the new version of R-Locker. We shall see that the proposal is effective and efficient, while novel in comparison with others in the literature where the typical parameterisation and monitoring-based detection methodologies previously described are considered [44][45][46].…”
Section: Related Workmentioning
confidence: 98%
“…From the above section, the rest of the document is devoted to describe and evaluate the new version of R-Locker. We shall see that the proposal is effective and efficient, while novel in comparison with others in the literature where the typical parameterisation and monitoring-based detection methodologies previously described are considered [44][45][46].…”
Section: Related Workmentioning
confidence: 98%
“…Their results showed that Fisher Score (FS) performed better than other methods with multiple classifiers. Unlike previous methods, Rabadiet al [23] used dynamic features in their experiment as they execute samples in an isolated virtual machine using Cuckoo Sandbox [24] to extract API-based features that were used in the detection phase. Nevertheless, the authors' work targeted only Windows 7 and as a result of depending on Cuckoo Sandbox, their method is limited to Cuckoo's hooked API calls only.…”
Section: Computer-basedmentioning
confidence: 99%
“…• Anti-analysis Techniques: In order to dynamically analyze a sample, it must be run on an isolated environment, for example Virtual Machines (VM) or sandboxes [23]. As a result, Malware developers began to use methods to evade from being run on a VM, sandbox, by detecting whether there exists analysis tools on the system and in addition check if the system is on debug mode or not.…”
Section: Challenges and Limitationsmentioning
confidence: 99%
“…Many detection systems based on artificial intelligence (AI) have been proposed in security tasks such as network intrusion detections (NIDSs) [1]- [3], malware detections [4], [5] and spam detections [6]. Nevertheless, numerous studies have revealed that AI-based systems are vulnerable to adversarial attacks [7]- [9].…”
Section: Introductionmentioning
confidence: 99%
“…There is less research on the adversarial robustness evaluation of ensemble models than linear and neural networks models [14]- [16], despite the fact that many security-related applications use ensemble learning techniques because of their flexibility, resilience and competitive performance [5], [17], [18]. Moreover, some studies showed model ensembles [19], [20] and ensemble defenses [21], [22] will also enhance the robustness of models, while other researchers have challenged this claim [23]- [25].…”
Section: Introductionmentioning
confidence: 99%