2023
DOI: 10.1016/j.cose.2023.103103
|View full text |Cite
|
Sign up to set email alerts
|

AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Addressing challenges posed by traditional methods in adapting to massive data [12] AMGmal for resilience [7] Resilience in Adversarial Machine Learning Advocating for resilience in malware detection models against adversarial attacks. [2] Challenges in anti-malware technologies Emphasis on adaptive strategies due to developments in encryption and obfuscation [8] Resource conservation and accuracy maintenance Focus on feature selection and hybrid deep learning frameworks [1] DQEAF framework for evading traditional detection engines…”
Section: A Maleficent Neural Networkmentioning
confidence: 99%
See 4 more Smart Citations
“…Addressing challenges posed by traditional methods in adapting to massive data [12] AMGmal for resilience [7] Resilience in Adversarial Machine Learning Advocating for resilience in malware detection models against adversarial attacks. [2] Challenges in anti-malware technologies Emphasis on adaptive strategies due to developments in encryption and obfuscation [8] Resource conservation and accuracy maintenance Focus on feature selection and hybrid deep learning frameworks [1] DQEAF framework for evading traditional detection engines…”
Section: A Maleficent Neural Networkmentioning
confidence: 99%
“…Use of reinforcement learning for evading detection engines [9] Lightweight CNN for efficient feature extraction Utilisation of disassembled instructions for identifying polymorphic and zero-day malware [10] Multilayered ANN for comprehensive understanding Incorporation of data from various sources for a comprehensive understanding [11] Deep learning with feature extraction Use of grayscale images and OpCode 3-grams for automated and adaptable malware characterisation [12] AMGmal for adversarial attack mitigation additions to the literature for this research, as understanding the techniques that can be employed is crucial for contributing to further studies aimed at finding ways to detect or mitigate these "evil" models.…”
Section: A Maleficent Neural Networkmentioning
confidence: 99%
See 3 more Smart Citations