2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) 2020
DOI: 10.1109/icdcs47774.2020.00089
|View full text |Cite
|
Sign up to set email alerts
|

Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…Soteria [ 10 ] is a static analyzer using the model-checking technique (MCT), that extracts a state model from the code of an IoT application to verify if an application or multi-app system respects security, safety, and functional properties. Another version is Soteria2 [ 42 ], a static analyzer using the convolutional neural network (CNN). It is a random walk-based traversal method for feature extraction that employs both density-based and level-based CFG labels to achieve consistent representation.…”
Section: Related Work and Research Goalsmentioning
confidence: 99%
“…Soteria [ 10 ] is a static analyzer using the model-checking technique (MCT), that extracts a state model from the code of an IoT application to verify if an application or multi-app system respects security, safety, and functional properties. Another version is Soteria2 [ 42 ], a static analyzer using the convolutional neural network (CNN). It is a random walk-based traversal method for feature extraction that employs both density-based and level-based CFG labels to achieve consistent representation.…”
Section: Related Work and Research Goalsmentioning
confidence: 99%
“…Despite the work in CV and NLP, there is a growing number of research ib the adversarial attack in cyber security domains, including malware detection [32][33][34], intrusion detection [35,36], etc. Such facts suggest that the vulnerability of neural network models widely exists.…”
Section: Related Workmentioning
confidence: 99%
“…This manipulation enables benign applications to inject their block of bytes into malicious binary. According to [25], some code-level malware applies perturbation and then modifies the original code structure. When malware attack the CFG of an Android-based device, it causes structural modification of the code's feature space.…”
Section: Api Callsmentioning
confidence: 99%