Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Malware Analysis
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
ROP chains
visual analytics system
visual analytics
visual aids
tools
Task Analysis
software reliability
semantically meaningful gadgets
semantically correct chains
security of data
security
Scalability
ROPMate
ROP-based exploits
ROP-based attacks
ROP Exploits
Buildings
rop attacks
return-oriented programming
return oriented programming
Resiliency
Registers
pubcrawl
programming
program testing
Malware Analysis
Human behavior
data visualisation
data analysis
composability
code reuse
biblio
DoSE: Deobfuscation Based on Semantic Equivalence
Submitted by grigby1 on Mon, 08/05/2019 - 11:35am
code cloning
collaboration
control-flow graph
deobfuscation
false trust
Malware Analysis
obfuscation
opaque predicate
policy-based governance
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
Symbolic Execution
biblio
Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection Models
Submitted by aekwall on Mon, 06/24/2019 - 2:43pm
Human behavior
Training
static analysis-based malware classifiers
Resiliency
pubcrawl
program diagnostics
pattern classification
Neural networks
Metrics
malware detection
malware classification accuracy
Malware Analysis
malware
learning (artificial intelligence)
Jacobian matrices
invasive software
adversarial attacks
Engines
Dynamic Malware Classification
dynamic analysis-based
deep learning-based systems
deep learning classification systems
deep learning
crafting adversarial samples
computer security
classification algorithm
anti-malware engine
anti-malware companies
adversarial neural malware detection models
adversarial learning-based attacks
adversarial learning
biblio
Implementation of Adversarial Scenario to Malware Analytic
Submitted by aekwall on Mon, 06/24/2019 - 2:43pm
adversarial setting
Deep Neural Network
Human behavior
Malware Analysis
Metrics
pubcrawl
Resiliency
biblio
Accurate Malware Detection by Extreme Abstraction
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
analysis
classification
detection
Human behavior
malware
Malware Analysis
Metrics
pubcrawl
Resiliency
biblio
Static and Dynamic Malware Analysis Using Machine Learning
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
Internet oriented machines security
summary information
static malware analysis
static analysis
sandboxing
Resiliency
registry keys changed
pubcrawl
PEFILE
obfuscate
Metrics
malwares
malware
machine learning
learning (artificial intelligence)
invasive software
Malware Analysis
Human behavior
feature extraction
evade
Dynamic Malware Analysis
dynamic analysis
DLLs
Data mining
cuckoo sandbox
Classification algorithms
Binary
application program interfaces
APIs
privacy
Predictive Metrics
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
A light-weight malware static visual analysis for IoT infrastructure
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
large-scale malware
visualization
Resiliency
pubcrawl
MICS
Microwave integrated circuits
microsoft windows
Metrics
malware image classification system
malware family classification
malware attacks
Malware Analysis
malware
light-weight malware static visual analysis
classification
large-scale IoT malware
IoT infrastructure
invasive software
Internet of Things
image representation
image classification
hybrid local malware features
hybrid global malware features
Human behavior
gray-scale image
Gray-scale
feature extraction
Cloud Computing
biblio
Dynamic malware analysis of phishing emails
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
potentially new malwares
Malware Analysis
malware authors
malware samples
Metrics
network communication
operating system
Phishing
phishing emails
malware
pubcrawl
Resiliency
Servers
Signature Generation
SPIM messages
standard analysis methodology
system monitoring
tools
digital signatures
anomaly signature
anti-malware
anti-virus products
automatic generation
complete dynamic analysis laboratory setting
comprehensive dynamic analysis
Computer crime
computer viruses
active signature
dynamic analysis laboratory setting
Dynamic Malware Analysis
Electronic mail
honeynet
Human behavior
internet
invasive software
biblio
A Novel Malware Analysis Framework for Malware Detection and Classification Using Machine Learning Approach
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
cuckoo sandbox
Human behavior
Malware Analysis
malware classification
malware detection
Metrics
pubcrawl
Resiliency
SMO
static and dynamic analysis
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »