SOTAVerified

Malware Analysis

Papers

Showing 125 of 89 papers

TitleStatusHype
Semantic Preprocessing for LLM-based Malware Analysis0
EMBER2024 -- A Benchmark Dataset for Holistic Evaluation of Malware ClassifiersCode2
System Calls for Malware Detection and Classification: Methodologies and Applications0
Adapting Novelty towards Generating Antigens for Antivirus systems0
DecompileBench: A Comprehensive Benchmark for Evaluating Decompilers in Real-World ScenariosCode1
Dual Explanations via Subgraph Matching for Malware Detection0
Malware analysis assisted by AI with R2AI0
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering0
Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code0
On Benchmarking Code LLMs for Android Malware Analysis0
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security DataCode1
LAMD: Context-driven Android Malware Detection and Classification with LLMs0
Recent Advances in Malware Detection: Graph Learning and Explainability0
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware0
On the Lack of Robustness of Binary Function Similarity Systems0
Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM0
Is Function Similarity Over-Engineered? Building a BenchmarkCode1
Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges0
Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization0
Magika: AI-Powered Content-Type DetectionCode11
Revisiting Static Feature-Based Android Malware Detection0
Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges0
A Lean Transformer Model for Dynamic Malware Analysis and Detection0
On the Robustness of Malware Detectors to Adversarial Samples0
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response0
Show:102550
← PrevPage 1 of 4Next →

No leaderboard results yet.