4.7 Article

Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Malware Dynamic Analysis Evasion Techniques: A Survey

Amir Afianian et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Theory & Methods

From Hack to Elaborate Technique-A Survey on Binary Rewriting

Matthias Wenzl et al.

ACM COMPUTING SURVEYS (2019)

Proceedings Paper Computer Science, Information Systems

AIMED: Evolving Malware with Genetic Programming to Evade Detection

Raphael Labaca Castro et al.

2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)

Proceedings Paper Engineering, Industrial

ARMED: How Automatic Malware Modifications Can Evade Static Detection?

Raphael Labaca Castro et al.

5TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2019) (2019)

Article Computer Science, Artificial Intelligence

Wild patterns: Ten years after the rise of adversarial machine learning

Battista Biggio et al.

PATTERN RECOGNITION (2018)

Proceedings Paper Computer Science, Software Engineering

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

Ishai Rosenberg et al.

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018 (2018)