SOTAVerified

Malware Analysis

Papers

Showing 150 of 89 papers

TitleStatusHype
Magika: AI-Powered Content-Type DetectionCode11
EMBER2024 -- A Benchmark Dataset for Holistic Evaluation of Malware ClassifiersCode2
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security DataCode1
Avast-CTU Public CAPE DatasetCode1
DecompileBench: A Comprehensive Benchmark for Evaluating Decompilers in Real-World ScenariosCode1
Is Function Similarity Over-Engineered? Building a BenchmarkCode1
Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language ModelCode1
Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware RepresentationsCode1
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security AnalysisCode1
Nebula: Self-Attention for Dynamic Malware AnalysisCode1
Auxiliary-Classifier GAN for Malware Analysis0
Boosting Neural Networks to Decompile Optimized Binaries0
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism0
Data Augmentation for Opcode Sequence Based Malware Detection0
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment0
Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges0
Deep learning guided Android malware and anomaly detection0
Devising Malware Characterstics using Transformers0
DIRECT : A Transformer-based Model for Decompiled Identifier Renaming0
Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization0
Dual Explanations via Subgraph Matching for Malware Detection0
Efficient Malware Analysis Using Metric Embeddings0
Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges0
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware0
Exploring the Efficacy of Large Language Models (GPT-4) in Binary Reverse Engineering0
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware0
Fuzzy Hashing as Perturbation-Consistent Adversarial Kernel Embedding0
GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection0
From Malware Samples to Fractal Images: A New Paradigm for Classification. (Version 2.0, Previous version paper name: Have you ever seen malware?)0
Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code0
Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks0
On the Robustness of Malware Detectors to Adversarial Samples0
A Lean Transformer Model for Dynamic Malware Analysis and Detection0
A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification0
Adapting Novelty towards Generating Antigens for Antivirus systems0
An Efficient Multi-Step Framework for Malware Packing Identification0
A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection0
apk2vec: Semi-supervised multi-view representation learning for profiling Android applications0
A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis0
Artificial Intelligence Based Malware Analysis0
On the Lack of Robustness of Binary Function Similarity Systems0
Ontology-driven Knowledge Graph for Android Malware0
PageRank in Malware Categorization0
Recent Advances in Malware Detection: Graph Learning and Explainability0
Revisiting Static Feature-Based Android Malware Detection0
Semantic-aware Binary Code Representation with BERT0
Semantic Preprocessing for LLM-based Malware Analysis0
SeqNet: An Efficient Neural Network for Automatic Malware Detection0
Smart OMVI: Obfuscated Malware Variant Identification using a novel dataset0
Survey of Malware Analysis through Control Flow Graph using Machine Learning0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.