SOTAVerified

Malware Analysis

Papers

Showing 150 of 89 papers

TitleStatusHype
Magika: AI-Powered Content-Type DetectionCode11
EMBER2024 -- A Benchmark Dataset for Holistic Evaluation of Malware ClassifiersCode2
Is Function Similarity Over-Engineered? Building a BenchmarkCode1
Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware RepresentationsCode1
CyberLLMInstruct: A New Dataset for Analysing Safety of Fine-Tuned LLMs Using Cyber Security DataCode1
Avast-CTU Public CAPE DatasetCode1
DecompileBench: A Comprehensive Benchmark for Evaluating Decompilers in Real-World ScenariosCode1
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security AnalysisCode1
Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language ModelCode1
Nebula: Self-Attention for Dynamic Malware AnalysisCode1
Revisiting Deep Learning for Variable Type RecoveryCode0
KiloGrams: Very Large N-Grams for Malware ClassificationCode0
SAFE: Self-Attentive Function Embeddings for Binary SimilarityCode0
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine LearningCode0
Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural NetworkCode0
On Ensemble LearningCode0
Malware triage for early identification of Advanced Persistent Threat activitiesCode0
Interpreting Machine Learning Malware Detectors Which Leverage N-gram AnalysisCode0
Dynamic Malware Analysis with Feature Engineering and Feature LearningCode0
A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code AnalysisCode0
Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call GraphletsCode0
Evading Malware Classifiers via Monte Carlo Mutant Feature DiscoveryCode0
AndrODet: An Adaptive Android Obfuscation DetectorCode0
Large Language Models for Cyber Security: A Systematic Literature ReviewCode0
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection TechniqueCode0
Threat Behavior Textual Search by Attention Graph IsomorphismCode0
Reliable Malware Analysis and Detection using Topology Data AnalysisCode0
GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection0
From Malware Samples to Fractal Images: A New Paradigm for Classification. (Version 2.0, Previous version paper name: Have you ever seen malware?)0
Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code0
LAMD: Context-driven Android Malware Detection and Classification with LLMs0
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering0
Learning Malware Representation based on Execution Sequences0
Leveraging Artificial Intelligence on Binary Code Comprehension0
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection0
MAIL: Malware Analysis Intermediate Language0
Malware analysis assisted by AI with R2AI0
Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability0
Malware Analysis with Symbolic Execution and Graph Kernel0
Malware Detection using Artificial Bee Colony Algorithm0
Malware Detection using Machine Learning and Deep Learning0
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation0
NtMalDetect: A Machine Learning Approach to Malware Detection Using Native API System Calls0
On Benchmarking Code LLMs for Android Malware Analysis0
On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors0
On the Lack of Robustness of Binary Function Similarity Systems0
Ontology-driven Knowledge Graph for Android Malware0
PageRank in Malware Categorization0
Recent Advances in Malware Detection: Graph Learning and Explainability0
Revisiting Static Feature-Based Android Malware Detection0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.