Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning
暂无分享,去创建一个
Mitsuaki Akiyama | Takeshi Yagi | Kunio Hato | Toshiki Shibahara | Daiki Chiba | Daiki Chiba | Toshiki Shibahara | Mitsuaki Akiyama | Takeshi Yagi | K. Hato
[1] Mitsuaki Akiyama,et al. Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[2] Juan Caballero,et al. AVclass: A Tool for Massive Malware Labeling , 2016, RAID.
[3] Leyla Bilge,et al. The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics , 2015, CCS.
[4] Mitsuaki Akiyama,et al. BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[5] Davide Balzarotti,et al. SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers , 2015, 2015 IEEE Symposium on Security and Privacy.
[6] Saumya Debray,et al. A Generic Approach to Automatic Deobfuscation of Executable Code , 2015, 2015 IEEE Symposium on Security and Privacy.
[7] Aziz Mohaisen,et al. Chatter: Classifying malware families using system event ordering , 2014, 2014 IEEE Conference on Communications and Network Security.
[8] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[9] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[10] Christopher Krügel,et al. BareCloud: Bare-metal Analysis-based Evasive Malware Detection , 2014, USENIX Security Symposium.
[11] Christopher Potts,et al. Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank , 2013, EMNLP.
[12] Roberto Perdisci,et al. ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates , 2013, USENIX Security Symposium.
[13] Ali A. Ghorbani,et al. Automated malware classification based on network behavior , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[14] Christopher Krügel,et al. FORECAST: skimming off the malware cream , 2011, ACSAC '11.
[15] Takeshi Yagi,et al. Controlling malware HTTP communications in dynamic analysis system using search engine , 2011, 2011 Third International Workshop on Cyberspace Safety and Security (CSS).
[16] Andrew Y. Ng,et al. Parsing Natural Scenes and Natural Language with Recursive Neural Networks , 2011, ICML.
[17] Giovanni Vigna,et al. Prophiler: a fast filter for the large-scale detection of malicious web pages , 2011, WWW.
[18] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[19] Sattar Hashemi,et al. Malware detection based on mining API calls , 2010, SAC '10.
[20] Christopher Krügel,et al. Improving the efficiency of dynamic malware analysis , 2010, SAC '10.
[21] Peter Dalgaard,et al. R Development Core Team (2010): R: A language and environment for statistical computing , 2010 .
[22] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[23] Christopher Krügel,et al. Effective and Efficient Malware Detection at the End Host , 2009, USENIX Security Symposium.
[24] Lawrence K. Saul,et al. Beyond blacklists: learning to detect malicious web sites from suspicious URLs , 2009, KDD.
[25] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[26] Somesh Jha,et al. A Layered Architecture for Detecting Malicious Behaviors , 2008, RAID.
[27] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[28] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[29] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[30] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[31] Jason D. M. Rennie,et al. Loss Functions for Preference Levels: Regression with Discrete Ordered Labels , 2005 .
[32] Andrew H. Sung,et al. Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.
[33] Leo Breiman,et al. Random Forests , 2001, Machine Learning.