no code implementations • 30 Mar 2021 • Dorel Yaffe, Danny Hendler
We present a novel end-to-end solution for in-memory malicious activity detection done prior to exploitation by leveraging machine learning capabilities based on data from unique run-time logs, which are carefully curated in order to detect malicious activity in the memory of protected processes.