Search Results for author: Veelasha Moonsamy

Found 5 papers, 2 papers with code

Level Up with RealAEs: Leveraging Domain Constraints in Feature Space to Strengthen Robustness of Android Malware Detection

no code implementations30 May 2022 Hamid Bostani, Zhengyu Zhao, Zhuoran Liu, Veelasha Moonsamy

Realistic attacks in the Android malware domain create Realizable Adversarial Examples (RealAEs), i. e., AEs that satisfy the domain constraints of Android malware.

Adversarial Robustness Android Malware Detection +2

EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection

no code implementations7 Oct 2021 Hamid Bostani, Veelasha Moonsamy

The proposed manipulation technique is a query-efficient optimization algorithm that can find and inject optimal sequences of transformations into malware apps.

Adversarial Attack Android Malware Detection +2

Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code

1 code implementation9 Sep 2020 Carlo Meijer, Veelasha Moonsamy, Jos Wetzels

The continuing use of proprietary cryptography in embedded systems across many industry verticals, from physical access control systems and telecommunications to machine-to-machine authentication, presents a significant obstacle to black-box security-evaluation efforts.

Cryptography and Security 68M25 E.3

Less is More: A privacy-respecting Android malware classifier using Federated Learning

1 code implementation16 Jul 2020 Rafa Gálvez, Veelasha Moonsamy, Claudia Diaz

In this paper we present LiM ("Less is More"), a malware classification framework that leverages Federated Learning to detect and classify malicious apps in a privacy-respecting manner.

Federated Learning Malware Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.