2020
DOI: 10.1007/978-3-030-57878-7_13
|View full text |Cite
|
Sign up to set email alerts
|

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
2

Relationship

5
2

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 25 publications
0
19
0
Order By: Relevance
“…However, we do plan to make it available on a case-by-case basis to reputable research groups. Prior to publishing our previous conference paper [11], we also communicated details and results of our attack to Malwarebytes.…”
Section: Ethical Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we do plan to make it available on a case-by-case basis to reputable research groups. Prior to publishing our previous conference paper [11], we also communicated details and results of our attack to Malwarebytes.…”
Section: Ethical Considerationsmentioning
confidence: 99%
“…In this paper, which is an extended version of our previous conference paper [11], we make the following contributions:…”
Section: Introductionmentioning
confidence: 99%
“…Deep Learning (DL) is the key factor for an increased interest in research and development in the area of Artificial Intelligence (AI), resulting in a surge of Machine Learning (ML) based applications that are reshaping entire fields and seedling new ones. Variations of Deep Neural Networks (DNN), the algorithms residing at the core of DL, have successfully been implemented in a plethora of domains, including here but not limited to image classification [17,35,80], natural language processing [6,22,73], speech recognition [33,37], data (image, text, audio) generation [7,40,44,61], cybersecurity [18,21,59], and even aiding with the COVID-19 pandemic [52,55].…”
Section: George Bernard Shawmentioning
confidence: 99%
“…Consequently, there is no clear understanding of how these approaches: (i) fare on a variety of compressed file formats and sizes, and (ii) compare to each other. The potential negative implications are significant: the use of ineffective techniques for identifying encrypted content can hinder the effectiveness of ransomware detectors [20], and significantly limit the capability of forensic tools.…”
Section: Introductionmentioning
confidence: 99%