Adversarial Attacks on Transformers-Based Malware Detectors.
Yash JakhotiyaHeramb PatilJugal RawlaniPublished in: CoRR (2022)
Keyphrases
- detect malicious
- malicious code
- detecting malicious
- attack scenarios
- object detection
- countermeasures
- static analysis
- reverse engineering
- multi agent
- anti virus
- network traffic
- malicious attacks
- watermarking scheme
- control flow
- terrorist attacks
- security protocols
- attack detection
- computer security
- feature detectors
- watermarking algorithm
- traffic analysis
- security threats
- malware detection
- cryptographic protocols
- data sets
- malicious users
- data mining