Optimization of code caves in malware binaries to evade machine learning detectors.
Javier YusteEduardo G. PardoJuan TapiadorPublished in: Comput. Secur. (2022)
Keyphrases
- machine learning
- source code
- control flow
- malicious code
- reverse engineering
- static analysis
- optimization algorithm
- data flow
- optimization problems
- constrained optimization
- optimization process
- open source
- machine learning methods
- reinforcement learning
- optimization approaches
- global optimization
- object detection
- optimization method
- artificial intelligence
- learning tasks
- knowledge acquisition
- text classification
- supervised learning
- information extraction
- active learning
- pattern recognition
- genetic algorithm
- software systems
- dynamic analysis
- malware detection
- data mining
- optimization methods
- network traffic
- computer vision
- text mining
- software engineering
- computer science
- high level