SOTAVerified

Malware Classification

Malware Classification is the process of assigning a malware sample to a specific malware family. Malware within a family shares similar properties that can be used to create signatures for detection and classification. Signatures can be categorized as static or dynamic based on how they are extracted. A static signature can be based on a byte-code sequence, binary assembly instruction, or an imported Dynamic Link Library (DLL). Dynamic signatures can be based on file system activities, terminal commands, network communications, or function and system call sequences.

Source: Behavioral Malware Classification using Convolutional Recurrent Neural Networks

Papers

Showing 101146 of 146 papers

TitleStatusHype
A Comparison of Graph Neural Networks for Malware Classification0
A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification0
Adversarial Perturbations Against Deep Neural Networks for Malware Classification0
A Hierarchical Convolutional Neural Network for Malware Classification0
A Malware Classification Survey on Adversarial Attacks and Defences0
A multi-task learning model for malware classification with useful file access pattern from API call sequence0
A Natural Language Processing Approach to Malware Classification0
An End-to-End Deep Learning Architecture for Classification of Malware’s Binary Content0
A Novel Feature Representation for Malware Classification0
A short review on Applications of Deep learning for Cyber security0
A Survey of Machine Learning Methods and Challenges for Windows Malware Classification0
AuthAttLyzer-V2: Unveiling Code Authorship Attribution using Enhanced Ensemble Learning Models & Generating Benchmark Dataset0
Backdooring Explainable Machine Learning0
Bayesian Deep Learning for Graphs0
Behavioral Malware Classification using Convolutional Recurrent Neural Networks0
Can Feature Engineering Help Quantum Machine Learning for Malware Detection?0
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks0
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection0
Classifying Malware Images with Convolutional Neural Network Models0
Classifying Malware Using Function Representations in a Static Call Graph0
Cluster Analysis and Concept Drift Detection in Malware0
CNN-LSTM and Transfer Learning Models for Malware Classification based on Opcodes and API Calls0
CNN vs ELM for Image-Based Malware Classification0
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection0
Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures0
Computer activity learning from system call time series0
Data Augmentation for Opcode Sequence Based Malware Detection0
Deep Learning and Open Set Malware Classification: A Survey0
Deep Learning-Driven Malware Classification with API Call Sequence Analysis and Concept Drift Handling0
Deep-Net: Deep Neural Network for Cyber Security Use Cases0
Defending Malware Classification Networks Against Adversarial Perturbations with Non-Negative Weight Restrictions0
Designing Deep Convolutional Neural Networks using a Genetic Algorithm for Image-based Malware Classification0
Detection of Advanced Malware by Machine Learning Techniques0
Detection under Privileged Information0
DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems0
Dynamic Malware Classification of Windows PE Files using CNNs and Greyscale Images Derived from Runtime API Call Argument Conversion0
Effectiveness of Adversarial Examples and Defenses for Malware Classification0
Enhancing Efficiency and Privacy in Memory-Based Malware Classification through Feature Selection0
Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications0
Examining Adversarial Learning against Graph-based IoT Malware Detection Systems0
Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges0
Exploring Adversarial Examples in Malware Detection0
Feature-level Malware Obfuscation in Deep Learning0
Generative Adversarial Networks and Image-Based Malware Classification0
Generative Models for Spear Phishing Posts on Social Media0
Graph Neural Network-based Android Malware Classification with Jumping Knowledge0
Show:102550
← PrevPage 3 of 3Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1MalConvAccuracy (10-fold)9,641Unverified
2TPOT ClassifierAccuracy (5-fold)98.94Unverified
3CNN BiLSTM - Reb SamplAccuracy (5-fold)98.2Unverified
4Ahmadi et al. (2016): ENT, Bytes 1-G, STR, IMG1, IMG2, MD1, MISC, OPC, SEC, REG, DP, API, SYM, MD2 IMG and Opcode N-Grams + Ensemble Learning (XGBoost)Accuracy (10-fold)1Unverified
5HYDRAAccuracy (10-fold)1Unverified
6Zhang et al. (2016): Total lines of each Section, Operation Code Count, API Usage, Special Symbols Count, Asm File Pixel Intensity Feature, Bytes File Block Size Distribution, Bytes File N-Gram + Ensemble Learning (XGBoost)Accuracy (10-fold)1Unverified
7OrthrusAccuracy (10-fold)0.99Unverified
8Opcode-based Shallow CNNAccuracy (10-fold)0.99Unverified
9Hierarchical Convolutional NetworkAccuracy (10-fold)0.99Unverified
10SEAAccuracy (10-fold)0.99Unverified
#ModelMetricClaimedVerifiedStatus
1GA Designed Deep CNNAccuracy0.99Unverified
2Gray-scale IMG CNNAccuracy (10-fold)0.98Unverified
3GRU + SVMAccuracy0.85Unverified
4FFNN + SVMAccuracy0.8Unverified
5CNN + SVMAccuracy0.77Unverified
#ModelMetricClaimedVerifiedStatus
1Levit-MCAccuracy96.6Unverified