SOTAVerified

Malware Analysis

Papers

Showing 5189 of 89 papers

TitleStatusHype
System Calls for Malware Detection and Classification: Methodologies and Applications0
The Curious Case of Machine Learning In Malware Detection0
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis0
Toward Metric Indexes for Incremental Insertion and Querying0
Towards resilient machine learning for ransomware detection0
Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM0
Reinforcement Learning for an Efficient and Effective Malware Investigation during Cyber Incident Response0
LAMD: Context-driven Android Malware Detection and Classification with LLMs0
Large Language Model (LLM) for Software Security: Code Analysis, Malware Analysis, Reverse Engineering0
Learning Malware Representation based on Execution Sequences0
Leveraging Artificial Intelligence on Binary Code Comprehension0
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection0
MAIL: Malware Analysis Intermediate Language0
Malware analysis assisted by AI with R2AI0
Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability0
Malware Analysis with Symbolic Execution and Graph Kernel0
Malware Detection using Artificial Bee Colony Algorithm0
Malware Detection using Machine Learning and Deep Learning0
ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation0
NtMalDetect: A Machine Learning Approach to Malware Detection Using Native API System Calls0
On Benchmarking Code LLMs for Android Malware Analysis0
On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors0
Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural NetworkCode0
Interpreting Machine Learning Malware Detectors Which Leverage N-gram AnalysisCode0
Evading Malware Classifiers via Monte Carlo Mutant Feature DiscoveryCode0
KiloGrams: Very Large N-Grams for Malware ClassificationCode0
Know Your Neighborhood: General and Zero-Shot Capable Binary Function Search Powered by Call GraphletsCode0
Revisiting Deep Learning for Variable Type RecoveryCode0
Threat Behavior Textual Search by Attention Graph IsomorphismCode0
Large Language Models for Cyber Security: A Systematic Literature ReviewCode0
Malware triage for early identification of Advanced Persistent Threat activitiesCode0
SAFE: Self-Attentive Function Embeddings for Binary SimilarityCode0
AndrODet: An Adaptive Android Obfuscation DetectorCode0
Dynamic Malware Analysis with Feature Engineering and Feature LearningCode0
A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code AnalysisCode0
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine LearningCode0
On Ensemble LearningCode0
Reliable Malware Analysis and Detection using Topology Data AnalysisCode0
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection TechniqueCode0
Show:102550
← PrevPage 2 of 2Next →

No leaderboard results yet.