Cited By
View all- Amich AEshete BYegneswaran VHoang NCalandrino JTroncoso C(2023)DeResistorProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620384(2617-2633)Online publication date: 9-Aug-2023
Existing techniques on adversarial malware generation employ feature mutations based on feature vectors extracted from malware. However, most (if not all) of these techniques suffer from a common limitation: feasibility of these attacks is unknown. The ...
Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread use of infection vectors such as documents. These infection vectors hide embedded malicious code to the victim users, facilitating the use of social ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in