Results 81 to 90 of about 10,938 (187)
Profiling and Visualizing Android Malware Datasets
Mobile devices are ubiquitous: nowadays most people own a mobile telephone.Because of this, it is a target of interest for attackers.Researchers in malware analysis put their effort to recognize these types of programs before they are installed on a user device.To do this, they perform experiments to automatically detect malware, for example with ...
openaire +1 more source
Through the static: Demystifying malware visualization via explainability
Security researchers grapple with the surge of malicious files, necessitating swift identification and classification of malware strains for effective protection. Visual classifiers and in particular Convolutional Neural Networks (CNNs) have emerged as vital tools for this task.
Brosolo, Matteo, P., Vinod, Conti, Mauro
openaire +2 more sources
Deep visualization classification method for malicious code based on Ngram-TFIDF
With the continuous increase in the scale and variety of malware, traditional malware analysis methods, which relied on manual feature extraction, become time-consuming and error-prone, rendering them unsuitable.
WANG Jinwei +4 more
doaj +2 more sources
Wavelet-Based and MAML-Driven Framework for Enhanced Few-Shot Malware Classification
Traditional malware classification approaches primarily address fixed sets of well-studied malware types and therefore struggle to accommodate the continual emergence of novel or previously unseen malware strains.
Abdullah Almuqrin +2 more
doaj +1 more source
DaViz: Visualization for Android Malware Datasets
With millions of Android malware samples available, researchers have a large amount of data to perform malware detection and classification, specially with the help of machine learning. Thus far, visualization tools focus on single samples or one-to-many comparison, but not a many-to-many approach.
Concepción Miranda, Tomás +3 more
openaire +1 more source
The rapid growth and diversification of malware variants, driven by advanced code obfuscation, evasion, and antianalysis techniques, present a significant threat to cybersecurity.
K. Sundara Krishnan, S. Syed Suhaila
doaj +1 more source
Rapid and accurate identification of unknown malware and its variants is the premise and basis for the effective prevention of malicious attacks. However, with the explosive growth of malware variants, the efficiency of manual updating of the sample ...
Dandan Zhang +3 more
doaj +1 more source
On Visual Hallmarks of Robustness to Adversarial Malware
A central challenge of adversarial learning is to interpret the resulting hardened model. In this contribution, we ask how robust generalization can be visually discerned and whether a concise view of the interactions between a hardened decision map and input samples is possible.
Huang, Alex +3 more
openaire +2 more sources
Research on lightweight malware classification method based on image domain
To address the high deployment costs and long prediction times associated with traditional malware classification methods, a lightweight malware visualization classification method was proposed.
SUN Jingzhang +6 more
doaj

