-
CCS
- 2022
- An Inside Look into the Practice of Malware Analysis
- 2021
- Structural Attack against Graph Based Android Malware Detection
- 2020
- VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization’s Clothing
- Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware
- 2019
- MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis
- 2022
-
USENIX
- 2021 (summer) (fall)
- Obfuscation-Resilient Executable Payload Extraction From Packed Malware
- Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
- The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
- Forecasting Malware Capabilities From Cyber Attack Memory Images
- YARIX: Scalable YARA-based Malware Intelligence
- 2020 (summer) (fall)
- On Training Robust PDF Malware Classifiers
- 2019
- TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
- 2021 (summer) (fall)
-
S&P
-
NDSS
- 2022
- X
- 2021
- Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
- Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection
- 2020
- You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis
- When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features
- Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem
- 2019
- ExSpectre: Hiding Malware in Speculative Execution
- 2022
-
RAID
- 2021
- Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown
- 2020
- SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub
- 2019
- Fluorescence: Detecting Kernel-Resident Malware in Clouds
- Towards Large-Scale Hunting for Android Negative-Day Malware
- Smart Malware using Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots
- SGXJail: Defeating Enclave Malware via Confinement
- 2021
-
ACSAC
- 2022
- ...
- 2021
- Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
- Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification
- 2020
- The Tangled Genealogy of IoT Malware
- Spotlight: Malware Lead Generation at Scale
- AVclass2: Massive Malware Tag Extraction from AV Labels
- Advanced Windows Methods on Malware Detection and Classification
- Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
- StegoNet: Turn Deep Neural Network into a Stegomalware
- 2019
- EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection
- CUBISMO: Decloaking Server-side Malware via Cubist Program Analysis
- Neurlux: Dynamic Malware Analysis Without Feature Engineering
- 2022