2021
DOI: 10.1016/j.cose.2021.102287
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and pitfalls in malware research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 33 publications
0
14
0
Order By: Relevance
“…Therefore, I conducted a critical literature review to identify common challenges and pitfalls in malware research. The findings were published in a paper [Botacin et al 2021b] which constitutes the core of all criticism 1 0 0 0 0 1 1 6 2 3 7 8 10 12 9 7 9 13 6 95 CCS 0 0 0 0 0 0 0 2 4 6 6 7 11 9 11 14 2 11 6 89 ACSAC 0 0 0 0 2 3 2 4 4 1 3 8 10 7 10 6 3 7 8 78 IEEE S&P 0 1 0 0 0 1 3 2 1 0 0 10 17 12 3 6 4 5 3 68 DIMVA 0 0 0 0 0 4 4 3 8 2 3 0 8 4 8 7 7 5 4 67 NDSS 0 0 0 0 1 0 2 0 3 3 3 3 2 4 5 4 9 7 3 49 RAID 0 0 1 0 0 1 3 0 0 0 0 0 3 5 5 3 4 3 3 31 ESORICS 0 0 0 0 0 1 0 0 2 1 presented in this thesis. Among all findings, I highlight: (i) the scarce number of longitudinal malware analysis studies in the literature, which motivates my investigation about the Brazilian scenario; and (ii) the uncertainty about the application of AV results in fair comparisons, which motivates my investigation on the development of new AV evaluation metrics.…”
Section: Academic Publicationsmentioning
confidence: 95%
“…Therefore, I conducted a critical literature review to identify common challenges and pitfalls in malware research. The findings were published in a paper [Botacin et al 2021b] which constitutes the core of all criticism 1 0 0 0 0 1 1 6 2 3 7 8 10 12 9 7 9 13 6 95 CCS 0 0 0 0 0 0 0 2 4 6 6 7 11 9 11 14 2 11 6 89 ACSAC 0 0 0 0 2 3 2 4 4 1 3 8 10 7 10 6 3 7 8 78 IEEE S&P 0 1 0 0 0 1 3 2 1 0 0 10 17 12 3 6 4 5 3 68 DIMVA 0 0 0 0 0 4 4 3 8 2 3 0 8 4 8 7 7 5 4 67 NDSS 0 0 0 0 1 0 2 0 3 3 3 3 2 4 5 4 9 7 3 49 RAID 0 0 1 0 0 1 3 0 0 0 0 0 3 5 5 3 4 3 3 31 ESORICS 0 0 0 0 0 1 0 0 2 1 presented in this thesis. Among all findings, I highlight: (i) the scarce number of longitudinal malware analysis studies in the literature, which motivates my investigation about the Brazilian scenario; and (ii) the uncertainty about the application of AV results in fair comparisons, which motivates my investigation on the development of new AV evaluation metrics.…”
Section: Academic Publicationsmentioning
confidence: 95%
“…To thoroughly and correctly assess the detection capabilities of EKnad, we considered state-of-the-art methodologies and guidelines for evaluating ML algorithms in the computer security domain [49]. More specifically, there is a significant body of works (e.g., [50], [51], [52]) that have identified pitfalls in the evaluation procedure of ML algorithms when they are applied to detect malware, spam and network attacks. We have identified that the same erroneous evaluation methodologies have been also carried out in previous works related to EK detection, undermining the trustworthiness of their obtained experimental results.…”
Section: Methodsmentioning
confidence: 99%
“…This method is highly effective in evaluating the proposed methods; however, the lack of a commonly adopted dataset prevents comparing the evaluation metrics of the proposed methods. Botacin et al presented challenges and pitfalls in the malware research area and highlight the usage of nonpublicly available datasets limits reproducibility and prevents comparison of evaluation metrics [18]. The comparison of IoT Malware datasets is given in Table II.…”
Section: B Iot Malware Datasetsmentioning
confidence: 99%