scholarly journals Exploring Adversarial Examples in Malware Detection

Author(s):  
Octavian Suciu ◽  
Scott E. Coull ◽  
Jeffrey Johns
Author(s):  
Kathrin Grosse ◽  
Nicolas Papernot ◽  
Praveen Manoharan ◽  
Michael Backes ◽  
Patrick McDaniel

Author(s):  
Ahmed Abusnaina ◽  
Hisham Alasmary ◽  
Mohammed Abuhamad ◽  
Saeed Salem ◽  
DaeHun Nyang ◽  
...  

2023 ◽  
Vol 55 (1) ◽  
pp. 1-35
Author(s):  
Deqiang Li ◽  
Qianmu Li ◽  
Yanfang (Fanny) Ye ◽  
Shouhuai Xu

Malicious software (malware) is a major cyber threat that has to be tackled with Machine Learning (ML) techniques because millions of new malware examples are injected into cyberspace on a daily basis. However, ML is vulnerable to attacks known as adversarial examples. In this article, we survey and systematize the field of Adversarial Malware Detection (AMD) through the lens of a unified conceptual framework of assumptions, attacks, defenses, and security properties. This not only leads us to map attacks and defenses to partial order structures, but also allows us to clearly describe the attack-defense arms race in the AMD context. We draw a number of insights, including: knowing the defender’s feature set is critical to the success of transfer attacks; the effectiveness of practical evasion attacks largely depends on the attacker’s freedom in conducting manipulations in the problem space; knowing the attacker’s manipulation set is critical to the defender’s success; and the effectiveness of adversarial training depends on the defender’s capability in identifying the most powerful attack. We also discuss a number of future research directions.


2018 ◽  
Vol 6 (12) ◽  
pp. 879-887
Author(s):  
Om Prakash Samantray ◽  
Satya Narayana Tripathy ◽  
Susant Kumar Das

2011 ◽  
Vol 31 (4) ◽  
pp. 1006-1009
Author(s):  
Ning GUO ◽  
Xiao-yan SUN ◽  
He LIN ◽  
Hua MOU

Sign in / Sign up

Export Citation Format

Share Document