Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
暂无分享,去创建一个
[1] Wen-Chuan Lee,et al. Trojaning Attack on Neural Networks , 2018, NDSS.
[2] Scott Lundberg,et al. A Unified Approach to Interpreting Model Predictions , 2017, NIPS.
[3] Jerry Li,et al. Spectral Signatures in Backdoor Attacks , 2018, NeurIPS.
[4] Carlos Guestrin,et al. "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.
[5] Gianluca Stringhini,et al. MaMaDroid , 2019, ACM Trans. Priv. Secur..
[6] Fabio Roli,et al. Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[7] Marius Kloft,et al. Online Anomaly Detection under Adversarial Impact , 2010, AISTATS.
[8] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[9] Patrick D. McDaniel,et al. Adversarial Examples for Malware Detection , 2017, ESORICS.
[10] Blaine Nelson,et al. Poisoning Attacks against Support Vector Machines , 2012, ICML.
[11] Lorenzo Cavallaro,et al. Intriguing Properties of Adversarial ML Attacks in the Problem Space , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[12] Aleksander Madry,et al. On Evaluating Adversarial Robustness , 2019, ArXiv.
[13] Jon Barker,et al. Malware Detection by Eating a Whole EXE , 2017, AAAI Workshops.
[14] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[15] Tudor Dumitras,et al. Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks , 2018, NeurIPS.
[16] Claudia Eckert,et al. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[17] Magnus Nyström,et al. Adversarial Machine Learning-Industry Perspectives , 2020, 2020 IEEE Security and Privacy Workshops (SPW).
[18] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[19] Zhenkai Liang,et al. Neural Nets Can Learn Function Type Signatures From Binaries , 2017, USENIX Security Symposium.
[20] Zhi-Hua Zhou,et al. Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[21] James Newsome,et al. Paragraph: Thwarting Signature Learning by Training Maliciously , 2006, RAID.
[22] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[23] Yanjun Qi,et al. Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers , 2016, NDSS.
[24] Igor Santos,et al. Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..
[25] Marek Krcál,et al. Deep Convolutional Malware Classifiers Can Learn from Raw Executables and Labels Only , 2018, International Conference on Learning Representations.
[26] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[27] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[28] Scott E. Coull,et al. Exploring Adversarial Examples in Malware Detection , 2018, 2019 IEEE Security and Privacy Workshops (SPW).
[29] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[30] Jules White,et al. Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[31] Michael Carl Tschantz,et al. Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels , 2015, AISec@CCS.
[32] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[33] Benjamin Edwards,et al. Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering , 2018, SafeAI@AAAI.
[34] Brendan Dolan-Gavitt,et al. Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks , 2018, RAID.
[35] Angelos Stavrou,et al. Malicious PDF detection using metadata and structural features , 2012, ACSAC '12.
[36] Aleksander Madry,et al. Clean-Label Backdoor Attacks , 2018 .
[37] Chang Liu,et al. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[38] Patrick D. McDaniel,et al. Adversarial Perturbations Against Deep Neural Networks for Malware Classification , 2016, ArXiv.
[39] Ben Y. Zhao,et al. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[40] Salvatore J. Stolfo,et al. Casting out Demons: Sanitizing Training Data for Anomaly Sensors , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[41] Carl A. Gunter,et al. Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps , 2017, ACSAC.
[42] Dawn Xiaodong Song,et al. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.
[43] Dawn Xiaodong Song,et al. Limits of Learning-based Signature Generation with Adversaries , 2008, NDSS.
[44] Claudia Eckert,et al. Is Feature Selection Secure against Training Data Poisoning? , 2015, ICML.
[45] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[46] Hyrum S. Anderson,et al. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models , 2018, ArXiv.
[47] Brendan Dolan-Gavitt,et al. Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis , 2018, DIMVA.
[48] Fabio Roli,et al. Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization , 2017, AISec@CCS.
[49] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[50] Giovanni Vigna,et al. MalGene: Automatic Extraction of Malware Analysis Evasion Signature , 2015, CCS.
[51] Ankur Taly,et al. Axiomatic Attribution for Deep Networks , 2017, ICML.
[52] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[53] Ricardo J. G. B. Campello,et al. Density-Based Clustering Based on Hierarchical Density Estimates , 2013, PAKDD.
[54] Ali Dehghantanha,et al. Machine Learning Aided Static Malware Analysis: A Survey and Tutorial , 2018, ArXiv.
[55] Hugh Chen,et al. From local explanations to global understanding with explainable AI for trees , 2020, Nature Machine Intelligence.
[56] Tudor Dumitras,et al. When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks , 2018, USENIX Security Symposium.
[57] Fabio Roli,et al. Poisoning behavioral malware clustering , 2014, AISec '14.
[58] Wenke Lee,et al. Misleading worm signature generators using deliberate noise injection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).