“…Since malware detection is typically a classification task, various classical ML-based classifiers have been employed, such as logistic regression [135], SVMs [136], [137], knearest neighbors (k-NNs) [138], [139], decision trees [140], RFs [141], Naïve Bayes classifiers [142]. They operate in various feature spaces, containing either static features, such as strings (e.g., filenames, code fragments), N-grams, API calls, entropy, malware representation as a gray scale image, function call graphs (FCGs), CFGs, or dynamic ones: values of the memory contents at runtime, dynamic instruction traces (sequences of processor instructions called during the execution of a program), OpCodes [143], network traffic parameters or API call traces [16].…”