Statically Detecting Adversarial Malware through Randomised Chaining

dc.contributor.authorCrawford, M.
dc.contributor.authorWang, W.
dc.contributor.authorSun, R.
dc.contributor.authorXue, M.
dc.contributor.conferenceAustralasian Computer Science Week (ACSW) (14 Feb 2022 - 17 Feb 2022 : Virtual Online)
dc.date.issued2022
dc.description.abstractWith the rapid growth of malware attacks, more antivirus developers consider deploying machine learning technologies into their productions. Researchers and developers published various machine learning-based detectors with high precision on malware detection in recent years. Although numerous machine learningbased malware detectors are available, they face various machine learning-targeted attacks, including evasion and adversarial attacks. This project explores how and why adversarial examples evade malware detectors, then proposes a randomised chaining method to defend against adversarial malware statically. This research is crucial for working towards combating the pertinent malware cybercrime.
dc.description.statementofresponsibilityMatthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue
dc.identifier.citationProceedings of the ACM International Conference Proceeding Series (ACSW, 2022), 2022, pp.91-95
dc.identifier.doi10.1145/3511616.3513103
dc.identifier.isbn9781450396066
dc.identifier.orcidWang, W. [0000-0001-6820-3283]
dc.identifier.orcidSun, R. [0000-0001-5404-8550]
dc.identifier.orcidXue, M. [0000-0001-5411-5039] [0000-0002-9172-4252]
dc.identifier.urihttps://hdl.handle.net/2440/135550
dc.language.isoen
dc.publisherAssociation for Computing Machinery
dc.publisher.placeOnline
dc.rights© 2022 Association for Computing Machinery. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
dc.source.urihttps://www.acm.org/
dc.titleStatically Detecting Adversarial Malware through Randomised Chaining
dc.typeConference paper
pubs.publication-statusPublished

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
hdl_135550.pdf
Size:
801.55 KB
Format:
Adobe Portable Document Format
Description:
Submitted version