2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC) 2020
DOI: 10.1109/dsc50466.2020.00066
|View full text |Cite
|
Sign up to set email alerts
|

An Adversarial Machine Learning Method Based on OpCode N-grams Feature in Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…However, many service vendors limit users' queries, and attackers need to reduce the number of queries because sending a large number of queries within a short time is perceived as a scam or a threat. Lit et al proposed an adversarial machine learning model to detect malware based on opcode n-grams [25].…”
Section: Adversarial Attacks On Neural Networkmentioning
confidence: 99%
“…However, many service vendors limit users' queries, and attackers need to reduce the number of queries because sending a large number of queries within a short time is perceived as a scam or a threat. Lit et al proposed an adversarial machine learning model to detect malware based on opcode n-grams [25].…”
Section: Adversarial Attacks On Neural Networkmentioning
confidence: 99%
“…Other Miscellaneous Malware Detectors. In [77], Li et al first train ML-based malware detection models based on OpCode n-gram features, i.e., the n-gram sequence of operation codes extracted from the disassembled PE file. Then, the authors employ an interpretation model of SHAP [85] to assign each n-gram feature with an importance value and observe that the 4-gram "move + and + or + move" feature is a typical malicious feature as it almost does not appear in the benign PE samples.…”
Section: White-box Adversarial Attacks Against Pe Malware Detectionmentioning
confidence: 99%
“…SHAP (SHapley Additive exPlanations) is a unified framework for interpreting predictions which was proposed by Li et al [26]. SHAP assigns each feature an importance value for a particular prediction.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…The present work is an extension of our DSC2020 submission [26]. The main addition is introducing the benign per-spective instead of only malicious perspective to achieve a bidirectional universal adversarial learning framework.…”
Section: Data Availabilitymentioning
confidence: 99%