1 code implementation • 20 Feb 2020 • Yao-Hui Chen, Mansour Ahmadi, Reza Mirzazade farkhani, Boyu Wang, Long Lu
Seed scheduling is a prominent factor in determining the yields of hybrid fuzzing.
2 code implementations • 22 Feb 2018 • Royi Ronen, Marian Radu, Corina Feuerstein, Elad Yom-Tov, Mansour Ahmadi
The Microsoft Malware Classification Challenge was announced in 2015 along with a publication of a huge dataset of nearly 0. 5 terabytes, consisting of disassembly and bytecode of more than 20K malware samples.
Cryptography and Security
no code implementations • 4 Feb 2018 • Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto
Several anti-malware vendors have claimed and advertised the application of machine learning in their products in which the inference phase is performed on servers and high-performance machines, but the feasibility of such approaches on mobile devices with limited computational resources has not yet been assessed by the research community, vendors still being skeptical.
Cryptography and Security
17 code implementations • 13 Nov 2015 • Mansour Ahmadi, Dmitry Ulyanov, Stanislav Semenov, Mikhail Trofimov, Giorgio Giacinto
This paradigm is presented and discussed in the present paper, where emphasis has been given to the phases related to the extraction, and selection of a set of novel features for the effective representation of malware samples.