“…Consistent with our goal of proposing a more realistic AME attack scenario in our study, we examine the past AME studies that support black-box and binary black-box attacks. Among these studies, AME studies that offer black-box attacks do not require knowing the specifications of the targeted anti-malware (Demetrio et al 2020;Castro, Biggio, and Dreo Rodosek 2019;Castro, Schmitt, and Rodosek 2019;Chen et al 2019a;Park, Khan, and Yener 2019;Suciu, Coull, and Johns 2019;Hu and Tan 2018). These studies employ a wide range of methods such as genetic algorithm (Demetrio et al 2020), random perturbations (Castro, Schmitt, and Rodosek 2019;Chen et al 2019a), dynamic programming (Park, Khan, and Yener 2019), and RNN (Hu and Tan 2018).…”