2019 11th International Conference on Knowledge and Systems Engineering (KSE) 2019
DOI: 10.1109/kse.2019.8919481
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Examples Against Image-based Malware Classification Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Te raw data of a virus' binary are represented in hexadecimal, with a compilation of metadata retrieved using the IDA disassembler tool. Binary representations of malware binary have also become popularized as a dataset in image analysis, with the Malimg dataset [100] having the greatest impact in recent years [101][102][103][104][105][106][107][108][109]. Other alternatives include the Malicia dataset [110] which contains 11,668 malicious binaries from 54 families retrieved from 500 drive-by downloads over 11 months.…”
Section: Metamorphic Datasets Generation Kits and Armoringmentioning
confidence: 99%
“…Te raw data of a virus' binary are represented in hexadecimal, with a compilation of metadata retrieved using the IDA disassembler tool. Binary representations of malware binary have also become popularized as a dataset in image analysis, with the Malimg dataset [100] having the greatest impact in recent years [101][102][103][104][105][106][107][108][109]. Other alternatives include the Malicia dataset [110] which contains 11,668 malicious binaries from 54 families retrieved from 500 drive-by downloads over 11 months.…”
Section: Metamorphic Datasets Generation Kits and Armoringmentioning
confidence: 99%