Malware Detection for Forensic Memory Using Deep Recurrent Neural Networks
暂无分享,去创建一个
Theodore B. Trafalis | Ioannis Karamitsos | Aishwarya Afzulpurkar | T. Trafalis | Ioannis Karamitsos | Aishwarya Afzulpurkar
[1] Edward Raff,et al. An investigation of byte n-gram features for malware classification , 2018, Journal of Computer Virology and Hacking Techniques.
[2] Li Jun,et al. HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[3] Razvan Pascanu,et al. Malware classification with recurrent networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[4] Jason Weston,et al. End-To-End Memory Networks , 2015, NIPS.
[5] Xinli Yang,et al. Deep Learning for Just-in-Time Defect Prediction , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security.
[6] Geoffrey E. Hinton,et al. On the importance of initialization and momentum in deep learning , 2013, ICML.
[7] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[8] Chengqi Zhang,et al. MetaGraph2Vec: Complex Semantic Path Augmented Heterogeneous Network Embedding , 2018, PAKDD.
[9] Yi Sun,et al. Malware Detection Based on Deep Learning of Behavior Graphs , 2019, Mathematical Problems in Engineering.
[10] Muhammad Zubair Shafiq,et al. Using spatio-temporal information in API calls with machine learning algorithms for malware detection , 2009, AISec '09.
[11] Wei Song,et al. DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis , 2018, CCS.
[12] Michael Cohen,et al. Anti-forensic resilient memory acquisition , 2013 .
[13] Jiliang Zhang,et al. DeepCheck: A Non-intrusive Control-flow Integrity Checking based on Deep Learning , 2019, ArXiv.
[14] Yanfang Ye,et al. Deep Neural Networks for Automatic Android Malware Detection , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[15] Edward Raff,et al. KiloGrams: Very Large N-Grams for Malware Classification , 2019, ArXiv.
[16] R. Sekar,et al. Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[17] Jack W. Stokes,et al. Malware classification with LSTM and GRU language models and a character-level CNN , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Stefan Vömel,et al. Acquisition and analysis of compromised firmware using memory forensics , 2015, Digit. Investig..
[19] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[20] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[21] Yoshua Bengio,et al. Zoneout: Regularizing RNNs by Randomly Preserving Hidden Activations , 2016, ICLR.