ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1912.09064
  4. Cited By
Malware Makeover: Breaking ML-based Static Analysis by Modifying
  Executable Bytes
v1v2 (latest)

Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

19 December 2019
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
S. Shintre
    AAML
ArXiv (abs)PDFHTML

Papers citing "Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes"

48 / 48 papers shown
Title
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Defending against Adversarial Malware Attacks on ML-based Android Malware Detection Systems
Ping He
Lorenzo Cavallaro
Shouling Ji
AAML
204
0
0
23 Jan 2025
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers
Matan Ben-Tov
Daniel Deutch
Nave Frost
Mahmood Sharif
AAML
207
1
0
20 Jan 2025
Neurlux: Dynamic Malware Analysis Without Feature Engineering
Neurlux: Dynamic Malware Analysis Without Feature Engineering
Chani Jindal
Christopher Salls
H. Aghakhani
Keith Long
Christopher Kruegel
Giovanni Vigna
117
62
0
24 Oct 2019
Misleading Authorship Attribution of Source Code using Adversarial
  Learning
Misleading Authorship Attribution of Source Code using Adversarial Learning
Erwin Quiring
Alwin Maier
Konrad Rieck
60
107
0
29 May 2019
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic
  Speech Recognition
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
AAML
86
381
0
22 Mar 2019
Certified Adversarial Robustness via Randomized Smoothing
Certified Adversarial Robustness via Randomized Smoothing
Jeremy M. Cohen
Elan Rosenfeld
J. Zico Kolter
AAML
169
2,052
0
08 Feb 2019
Theoretically Principled Trade-off between Robustness and Accuracy
Theoretically Principled Trade-off between Robustness and Accuracy
Hongyang R. Zhang
Yaodong Yu
Jiantao Jiao
Eric Xing
L. Ghaoui
Michael I. Jordan
159
2,560
0
24 Jan 2019
Explaining Vulnerabilities of Deep Learning to Adversarial Malware
  Binaries
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries
Christian Scano
Battista Biggio
Giovanni Lagorio
Fabio Roli
A. Armando
AAML
59
131
0
11 Jan 2019
Feature Denoising for Improving Adversarial Robustness
Feature Denoising for Improving Adversarial Robustness
Cihang Xie
Yuxin Wu
Laurens van der Maaten
Alan Yuille
Kaiming He
128
912
0
09 Dec 2018
Exploring Adversarial Examples in Malware Detection
Exploring Adversarial Examples in Malware Detection
Octavian Suciu
Scott E. Coull
Jeffrey Johns
AAML
89
193
0
18 Oct 2018
Adversarial Binaries for Authorship Identification
Adversarial Binaries for Authorship Identification
Xiaozhu Meng
B. Miller
S. Jha
AAML
38
11
0
21 Sep 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
82
291
0
16 Aug 2018
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors
Andrew Ilyas
Logan Engstrom
Aleksander Madry
MLAUAAML
104
375
0
20 Jul 2018
Non-Negative Networks Against Adversarial Attacks
Non-Negative Networks Against Adversarial Attacks
William Fleshman
Edward Raff
Jared Sylvester
Steven Forsyth
Mark McLean
AAML
60
41
0
15 Jun 2018
Robustifying Models Against Adversarial Attacks by Langevin Dynamics
Robustifying Models Against Adversarial Attacks by Langevin Dynamics
Vignesh Srinivasan
Arturo Marbán
K. Müller
Wojciech Samek
Shinichi Nakajima
AAML
70
9
0
30 May 2018
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using
  Generative Models
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models
Pouya Samangouei
Maya Kabkab
Rama Chellappa
AAMLGAN
86
1,179
0
17 May 2018
EMBER: An Open Dataset for Training Static PE Malware Machine Learning
  Models
EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models
Hyrum S. Anderson
P. Roth
56
479
0
12 Apr 2018
On the Robustness of the CVPR 2018 White-Box Adversarial Example
  Defenses
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses
Anish Athalye
Nicholas Carlini
AAML
74
170
0
10 Apr 2018
Adversarial Logit Pairing
Adversarial Logit Pairing
Harini Kannan
Alexey Kurakin
Ian Goodfellow
AAML
98
629
0
16 Mar 2018
Adversarial Malware Binaries: Evading Deep Learning for Malware
  Detection in Executables
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
Bojan Kolosnjaji
Ambra Demontis
Battista Biggio
Davide Maiorca
Giorgio Giacinto
Claudia Eckert
Fabio Roli
AAML
70
318
0
12 Mar 2018
Microsoft Malware Classification Challenge
Microsoft Malware Classification Challenge
Royi Ronen
Marian Radu
Corina Feuerstein
E. Yom-Tov
Mansour Ahmadi
65
381
0
22 Feb 2018
Certified Robustness to Adversarial Examples with Differential Privacy
Certified Robustness to Adversarial Examples with Differential Privacy
Mathias Lécuyer
Vaggelis Atlidakis
Roxana Geambasu
Daniel J. Hsu
Suman Jana
SILMAAML
96
939
0
09 Feb 2018
Obfuscated Gradients Give a False Sense of Security: Circumventing
  Defenses to Adversarial Examples
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Anish Athalye
Nicholas Carlini
D. Wagner
AAML
243
3,194
0
01 Feb 2018
Defense against Adversarial Attacks Using High-Level Representation
  Guided Denoiser
Defense against Adversarial Attacks Using High-Level Representation Guided Denoiser
Fangzhou Liao
Ming Liang
Yinpeng Dong
Tianyu Pang
Xiaolin Hu
Jun Zhu
87
888
0
08 Dec 2017
Exploring the Landscape of Spatial Robustness
Exploring the Landscape of Spatial Robustness
Logan Engstrom
Brandon Tran
Dimitris Tsipras
Ludwig Schmidt
Aleksander Madry
AAML
98
363
0
07 Dec 2017
Provable defenses against adversarial examples via the convex outer
  adversarial polytope
Provable defenses against adversarial examples via the convex outer adversarial polytope
Eric Wong
J. Zico Kolter
AAML
131
1,504
0
02 Nov 2017
Countering Adversarial Images using Input Transformations
Countering Adversarial Images using Input Transformations
Chuan Guo
Mayank Rana
Moustapha Cissé
Laurens van der Maaten
AAML
128
1,406
0
31 Oct 2017
Malware Detection by Eating a Whole EXE
Malware Detection by Eating a Whole EXE
Edward Raff
Jon Barker
Jared Sylvester
Robert Brandon
Bryan Catanzaro
Charles K. Nicholas
81
546
0
25 Oct 2017
Evasion Attacks against Machine Learning at Test Time
Evasion Attacks against Machine Learning at Test Time
Battista Biggio
Igino Corona
Davide Maiorca
B. Nelson
Nedim Srndic
Pavel Laskov
Giorgio Giacinto
Fabio Roli
AAML
163
2,160
0
21 Aug 2017
Houdini: Fooling Deep Structured Prediction Models
Houdini: Fooling Deep Structured Prediction Models
Moustapha Cissé
Yossi Adi
Natalia Neverova
Joseph Keshet
AAML
75
272
0
17 Jul 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILMOOD
319
12,138
0
19 Jun 2017
MagNet: a Two-Pronged Defense against Adversarial Examples
MagNet: a Two-Pronged Defense against Adversarial Examples
Dongyu Meng
Hao Chen
AAML
56
1,208
0
25 May 2017
Evading Classifiers by Morphing in the Dark
Evading Classifiers by Morphing in the Dark
Hung Dang
Yue Huang
E. Chang
AAML
97
124
0
22 May 2017
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection
  Methods
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods
Nicholas Carlini
D. Wagner
AAML
131
1,867
0
20 May 2017
Yes, Machine Learning Can Be More Secure! A Case Study on Android
  Malware Detection
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
Ambra Demontis
Marco Melis
Battista Biggio
Davide Maiorca
Dan Arp
Konrad Rieck
Igino Corona
Giorgio Giacinto
Fabio Roli
AAML
63
284
0
28 Apr 2017
Feature Squeezing: Detecting Adversarial Examples in Deep Neural
  Networks
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
Weilin Xu
David Evans
Yanjun Qi
AAML
97
1,273
0
04 Apr 2017
Adversarial Transformation Networks: Learning to Generate Adversarial
  Examples
Adversarial Transformation Networks: Learning to Generate Adversarial Examples
S. Baluja
Ian S. Fischer
GAN
79
286
0
28 Mar 2017
Detecting Adversarial Samples from Artifacts
Detecting Adversarial Samples from Artifacts
Reuben Feinman
Ryan R. Curtin
S. Shintre
Andrew B. Gardner
AAML
105
894
0
01 Mar 2017
On the (Statistical) Detection of Adversarial Examples
On the (Statistical) Detection of Adversarial Examples
Kathrin Grosse
Praveen Manoharan
Nicolas Papernot
Michael Backes
Patrick McDaniel
AAML
86
714
0
21 Feb 2017
Generating Adversarial Malware Examples for Black-Box Attacks Based on
  GAN
Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN
Weiwei Hu
Ying Tan
GAN
89
464
0
20 Feb 2017
On Detecting Adversarial Perturbations
On Detecting Adversarial Perturbations
J. H. Metzen
Tim Genewein
Volker Fischer
Bastian Bischoff
AAML
73
950
0
14 Feb 2017
Adversarial Machine Learning at Scale
Adversarial Machine Learning at Scale
Alexey Kurakin
Ian Goodfellow
Samy Bengio
AAML
477
3,148
0
04 Nov 2016
Towards Evaluating the Robustness of Neural Networks
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini
D. Wagner
OODAAML
282
8,587
0
16 Aug 2016
The Limitations of Deep Learning in Adversarial Settings
The Limitations of Deep Learning in Adversarial Settings
Nicolas Papernot
Patrick McDaniel
S. Jha
Matt Fredrikson
Z. Berkay Celik
A. Swami
AAML
117
3,968
0
24 Nov 2015
Evasion and Hardening of Tree Ensemble Classifiers
Evasion and Hardening of Tree Ensemble Classifiers
Alex Kantchelian
J. D. Tygar
A. Joseph
AAML
130
205
0
25 Sep 2015
Explaining and Harnessing Adversarial Examples
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAMLGAN
282
19,129
0
20 Dec 2014
Distributed Representations of Sentences and Documents
Distributed Representations of Sentences and Documents
Quoc V. Le
Tomas Mikolov
FaML
265
9,250
0
16 May 2014
Intriguing properties of neural networks
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
289
14,968
1
21 Dec 2013
1