Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection
暂无分享,去创建一个
[1] Lantao Yu,et al. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.
[2] Vinod Yegneswaran,et al. StegoTorus: a camouflage proxy for the Tor anonymity system , 2012, CCS.
[3] Ian Goldberg,et al. SkypeMorph: protocol obfuscation for Tor bridges , 2012, CCS.
[4] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[5] Thomas Ristenpart,et al. Protocol misidentification made easy with format-transforming encryption , 2013, CCS.
[6] Philipp Winter,et al. ScrambleSuit: a polymorphic network protocol to circumvent censorship , 2013, WPES.
[7] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[8] Olof Mogren,et al. C-RNN-GAN: Continuous recurrent neural networks with adversarial training , 2016, ArXiv.
[9] Sebastian Garcia,et al. THE NETWORK BEHAVIOUR OF MALWARE TO BLOCK MALICIOUS PATTERNS . THE STRATOSPHERE PROJECT : A BEHAVIOURAL IPS , 2016 .
[10] Christian Dietrich,et al. Hiding in Plain Sight Advances in malware covert communication channels , .
[11] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[12] Yu Fu,et al. Stealthy malware traffic - Not as innocent as it looks , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[13] Anthony Keane,et al. Improving the Stealthiness of DNS-Based Covert Communication , 2017 .
[14] Brandon Wiley. Dust : A Blocking-Resistant Internet Transport Protocol , 2011 .
[15] Doug Miller,et al. Intelligent, automated red team emulation , 2016, ACSAC.
[16] Kevin Lin,et al. Adversarial Ranking for Language Generation , 2017, NIPS.