DeepReflect: Discovering Malicious Functionality through Binary Reconstruction.
Evan DowningYisroel MirskyKyuhong ParkWenke LeePublished in: USENIX Security Symposium (2021)
Keyphrases
- three dimensional
- image reconstruction
- real time
- reconstruction process
- computerized tomography
- high resolution
- image quality
- reconstructed image
- reconstruction method
- malicious behavior
- malicious code
- malicious attacks
- discrete tomography
- compressed sensing
- shape recovery
- non binary
- learning algorithm
- genetic algorithm
- data mining
- neural network