SOTAVerified

Malware Classification

Malware Classification is the process of assigning a malware sample to a specific malware family. Malware within a family shares similar properties that can be used to create signatures for detection and classification. Signatures can be categorized as static or dynamic based on how they are extracted. A static signature can be based on a byte-code sequence, binary assembly instruction, or an imported Dynamic Link Library (DLL). Dynamic signatures can be based on file system activities, terminal commands, network communications, or function and system call sequences.

Source: Behavioral Malware Classification using Convolutional Recurrent Neural Networks

Papers

Showing 51100 of 146 papers

TitleStatusHype
Self-Supervised Vision Transformers for Malware DetectionCode1
On the Limitations of Continual Learning for Malware ClassificationCode1
On deceiving malware classification with section injectionCode1
Designing Deep Convolutional Neural Networks using a Genetic Algorithm for Image-based Malware Classification0
AI-based Malware and Ransomware Detection Models0
Generative Adversarial Networks and Image-Based Malware Classification0
Representation learning with function call graph transformations for malware open set recognition0
Backdooring Explainable Machine Learning0
Malceiver: Perceiver with Hierarchical and Multi-modal Features for Android Malware Detection0
Bayesian Deep Learning for Graphs0
Graph Neural Network-based Android Malware Classification with Jumping Knowledge0
Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures0
An Ensemble of Pre-trained Transformer Models For Imbalanced Multiclass Malware ClassificationCode1
Malware Classification Using Static Disassembly and Machine LearningCode1
Benchmark Static API Call Datasets for Malware Family Classification0
A Comprehensive Study on Learning-Based PE Malware Family Classification MethodsCode1
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks0
DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems0
Malware Classification Using Transfer Learning0
Malware Classification Using Deep Boosted Learning0
Data Augmentation for Opcode Sequence Based Malware Detection0
CNN vs ELM for Image-Based Malware Classification0
An Empirical Analysis of Image-Based Learning Techniques for Malware ClassificationCode1
Deep Learning for Android Malware Defenses: a Systematic Literature ReviewCode1
A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification0
Malware Classification with GMM-HMM Models0
Malware Classification Using Long Short-Term Memory Models0
Malware Classification with Word Embedding Features0
Adversarial Robustness with Non-uniform PerturbationsCode0
Realizable Universal Adversarial Perturbations for Malware0
Classifying Malware Using Function Representations in a Static Call Graph0
Classifying Malware Images with Convolutional Neural Network Models0
Malware Traffic Classification: Evaluation of Algorithms and an Automated Ground-truth Generation Pipeline0
Orthrus: A Bimodal Learning Architecture for Malware ClassificationCode0
DAEMON: Dataset-Agnostic Explainable Malware Classification Using Multi-Stage Feature MiningCode0
Less is More: A privacy-respecting Android malware classifier using Federated LearningCode0
A Survey of Machine Learning Methods and Challenges for Windows Malware Classification0
Trade-offs between membership privacy & adversarially robust learning0
HYDRA: A multimodal deep learning framework for malware classificationCode1
Why an Android App is Classified as Malware? Towards Malware Classification InterpretationCode1
A Framework for Enhancing Deep Neural Networks Against Adversarial MalwareCode1
Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification0
Deep Learning and Open Set Malware Classification: A Survey0
Explanation-Guided Backdoor Poisoning Attacks Against Malware ClassifiersCode1
Feature-level Malware Obfuscation in Deep Learning0
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks0
A New Burrows Wheeler Transform Markov DistanceCode1
Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural NetworkCode0
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection TechniqueCode0
A Hierarchical Convolutional Neural Network for Malware Classification0
Show:102550
← PrevPage 2 of 3Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1MalConvAccuracy (10-fold)9,641Unverified
2TPOT ClassifierAccuracy (5-fold)98.94Unverified
3CNN BiLSTM - Reb SamplAccuracy (5-fold)98.2Unverified
4Ahmadi et al. (2016): ENT, Bytes 1-G, STR, IMG1, IMG2, MD1, MISC, OPC, SEC, REG, DP, API, SYM, MD2 IMG and Opcode N-Grams + Ensemble Learning (XGBoost)Accuracy (10-fold)1Unverified
5HYDRAAccuracy (10-fold)1Unverified
6Zhang et al. (2016): Total lines of each Section, Operation Code Count, API Usage, Special Symbols Count, Asm File Pixel Intensity Feature, Bytes File Block Size Distribution, Bytes File N-Gram + Ensemble Learning (XGBoost)Accuracy (10-fold)1Unverified
7OrthrusAccuracy (10-fold)0.99Unverified
8Opcode-based Shallow CNNAccuracy (10-fold)0.99Unverified
9Hierarchical Convolutional NetworkAccuracy (10-fold)0.99Unverified
10SEAAccuracy (10-fold)0.99Unverified
#ModelMetricClaimedVerifiedStatus
1GA Designed Deep CNNAccuracy0.99Unverified
2Gray-scale IMG CNNAccuracy (10-fold)0.98Unverified
3GRU + SVMAccuracy0.85Unverified
4FFNN + SVMAccuracy0.8Unverified
5CNN + SVMAccuracy0.77Unverified
#ModelMetricClaimedVerifiedStatus
1Levit-MCAccuracy96.6Unverified