Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors.
Mario D'OnghiaFederico Di CesareLuigi GalloMichele CarminatiMario PolinoStefano ZaneroPublished in: AISec@CCS (2023)
Keyphrases
- detect malicious
- malicious code
- description logics
- detecting malicious
- attack scenarios
- expressive power
- reverse engineering
- object detection
- data driven
- static analysis
- countermeasures
- malicious attacks
- watermarking scheme
- security mechanisms
- security protocols
- security threats
- traffic analysis
- security risks
- attack detection
- malicious users
- conjunctive queries
- computer systems