SOTAVerified

Malware Classification

Malware Classification is the process of assigning a malware sample to a specific malware family. Malware within a family shares similar properties that can be used to create signatures for detection and classification. Signatures can be categorized as static or dynamic based on how they are extracted. A static signature can be based on a byte-code sequence, binary assembly instruction, or an imported Dynamic Link Library (DLL). Dynamic signatures can be based on file system activities, terminal commands, network communications, or function and system call sequences.

Source: Behavioral Malware Classification using Convolutional Recurrent Neural Networks

Papers

Showing 51100 of 146 papers

TitleStatusHype
Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection0
Image-Based Malware Classification Using QR and Aztec Codes0
Impact of Feature Encoding on Malware Classification Explainability0
Intelligent Systems Design for Malware Classification Under Adversarial Conditions0
Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features0
kNN Classification of Malware Data Dependency Graph Features0
Lempel-Ziv Networks0
Malceiver: Perceiver with Hierarchical and Multi-modal Features for Android Malware Detection0
MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning0
AI-based Malware and Ransomware Detection Models0
Malware Classification from Memory Dumps Using Machine Learning, Transformers, and Large Language Models0
Malware Classification using a Hybrid Hidden Markov Model-Convolutional Neural Network0
Malware Classification Using Deep Boosted Learning0
Malware Classification using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices0
Malware Classification Using Long Short-Term Memory Models0
Malware Classification Using Transfer Learning0
Malware Classification with GMM-HMM Models0
Malware Classification with Word Embedding Features0
Malware Detection using Machine Learning and Deep Learning0
Malware families discovery via Open-Set Recognition on Android manifest permissions0
Malware Traffic Classification: Evaluation of Algorithms and an Automated Ground-truth Generation Pipeline0
Model-agnostic clean-label backdoor mitigation in cybersecurity environments0
Multimodal Techniques for Malware Classification0
Benchmark Static API Call Datasets for Malware Family Classification0
N-opcode Analysis for Android Malware Classification and Categorization0
One-Class SVM with Privileged Information and its Application to Malware Detection0
On the (Statistical) Detection of Adversarial Examples0
OpCode-Based Malware Classification Using Machine Learning and Deep Learning Techniques0
Projecting "better than randomly": How to reduce the dimensionality of very large datasets in a way that outperforms random projections0
Trade-offs between membership privacy & adversarially robust learning0
Quantum Machine Learning for Malware Classification0
Random Forest for Malware Classification0
Representation learning with function call graph transformations for malware open set recognition0
Revisiting Static Feature-Based Android Malware Detection0
RNNSecureNet: Recurrent neural networks for Cyber security use-cases0
RNNSecureNet: Recurrent neural networks for Cybersecurity use-cases0
Scalable APT Malware Classification via Parallel Feature Extraction and GPU-Accelerated Learning0
Semantic-Aware Contrastive Fine-Tuning: Boosting Multimodal Malware Classification with Discriminative Embeddings0
Semantic Preprocessing for LLM-based Malware Analysis0
Generation & Evaluation of Adversarial Examples for Malware Obfuscation0
SoK: Applying Machine Learning in Security - A Survey0
Steganographic Capacity of Deep Learning Models0
Structure-based Anomaly Detection and Clustering0
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time0
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)0
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis0
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks0
Realizable Universal Adversarial Perturbations for Malware0
Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions0
XAI and Android Malware Models0
Show:102550
← PrevPage 2 of 3Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1MalConvAccuracy (10-fold)9,641Unverified
2TPOT ClassifierAccuracy (5-fold)98.94Unverified
3CNN BiLSTM - Reb SamplAccuracy (5-fold)98.2Unverified
4Ahmadi et al. (2016): ENT, Bytes 1-G, STR, IMG1, IMG2, MD1, MISC, OPC, SEC, REG, DP, API, SYM, MD2 IMG and Opcode N-Grams + Ensemble Learning (XGBoost)Accuracy (10-fold)1Unverified
5HYDRAAccuracy (10-fold)1Unverified
6Zhang et al. (2016): Total lines of each Section, Operation Code Count, API Usage, Special Symbols Count, Asm File Pixel Intensity Feature, Bytes File Block Size Distribution, Bytes File N-Gram + Ensemble Learning (XGBoost)Accuracy (10-fold)1Unverified
7OrthrusAccuracy (10-fold)0.99Unverified
8Opcode-based Shallow CNNAccuracy (10-fold)0.99Unverified
9Hierarchical Convolutional NetworkAccuracy (10-fold)0.99Unverified
10SEAAccuracy (10-fold)0.99Unverified
#ModelMetricClaimedVerifiedStatus
1GA Designed Deep CNNAccuracy0.99Unverified
2Gray-scale IMG CNNAccuracy (10-fold)0.98Unverified
3GRU + SVMAccuracy0.85Unverified
4FFNN + SVMAccuracy0.8Unverified
5CNN + SVMAccuracy0.77Unverified
#ModelMetricClaimedVerifiedStatus
1Levit-MCAccuracy96.6Unverified