Results 91 to 100 of about 18,338 (256)
Adversarial Examples with Unlimited Amount of Additions [PDF]
Malware detection methods based on gray images and deep learning have the characteristics of high detection accuracy and no need of feature engineering. Unfortunately, adversarial examples (AEs) can deceive such detection methods.
JIANG Zhoujie, CHEN Yi, XIONG Ziman, GUO Chun, SHEN Guowei
doaj +1 more source
AEDroid: Adaptive Enhanced Android Malware Detection‐Based on Interpretability of Deep Learning
As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged.
Pengfei Liu +5 more
wiley +1 more source
In this paper, I propose Yul2Vec, a novel method for representing Yul programs as distributed embeddings in continuous space. Yul serves as an intermediate language between Solidity and Ethereum Virtual Machine (EVM) bytecode, designed to enable more ...
Krzysztof Fonał
doaj +1 more source
Refactoring Java Programs for Customizable Locks Based on Bytecode Transformation
Developers of parallel programming are faced with choices of using various Java locks. Choosing the best lock is a challenging task because a multithreaded application implemented using different locks may end up with uncertain performance.
Yang Zhang +5 more
doaj +1 more source
The rapid growth and diversification of malware variants, driven by advanced code obfuscation, evasion, and antianalysis techniques, present a significant threat to cybersecurity. The inadequacy of traditional methods in accurately classifying these evolving threats highlights the need for effective and robust malware classification techniques.
K. Sundara Krishnan +2 more
wiley +1 more source
Verified Bytecode Verifiers [PDF]
Using the theorem prover Isabelle/HOL we have formalized and proved correct an executable bytecode verifier in the style of Kildall's algorithm for a significant subset of the Java Virtual Machine. First an abstract framework for proving correctness of data flow based type inference algorithms for assembly languages is formalized.
openaire +1 more source
MMF: A Lightweight Approach of Multimodel Fusion for Malware Detection
Nowadays, the Android system is widely used in mobile devices. The existence of malware in the Android system has posed serious security risks. Therefore, detecting malware has become a main research focus for Android devices. The existing malware detection methods include those based on static analysis, dynamic analysis, and hybrid analysis.
Bo Yang +4 more
wiley +1 more source
Test Data Generation of Bytecode by CLP Partial Evaluation
We employ existing partial evaluation (PE) techniques developed for Constraint Logic Programming (CLP) in order to automatically generate test-case generators for glass-box testing of bytecode. Our approach consists of two independent CLP PE phases.
Albert Albiol, Elvira +2 more
core
A Complexity Preserving Transformation from Jinja Bytecode to Rewrite Systems [PDF]
We revisit known transformations from Jinja bytecode to rewrite systems from the viewpoint of runtime complexity. Suitably generalising the constructions proposed in the literature, we define an alternative representation of Jinja bytecode (JBC ...
Moser, Georg, Schaper, Michael
core
cphVB: A System for Automated Runtime Optimization and Parallelization of Vectorized Applications
Modern processor architectures, in addition to having still more cores, also require still more consideration to memory-layout in order to run at full capacity.
Blum, Troels +3 more
core +1 more source

