Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

12 Mar 2018Bojan KolosnjajiAmbra DemontisBattista BiggioDavide MaiorcaGiorgio GiacintoClaudia EckertFabio Roli

Machine-learning methods have already been exploited as useful tools for detecting malicious executable files. They leverage data retrieved from malware samples, such as header fields, instruction sequences, or even raw bytes, to learn models that discriminate between benign and malicious software... (read more)

PDF Abstract


No code implementations yet. Submit your code now


Results from the Paper

  Submit results from this paper to get state-of-the-art GitHub badges and help the community compare results to other papers.

Methods used in the Paper

🤖 No Methods Found Help the community by adding them if they're not listed; e.g. Deep Residual Learning for Image Recognition uses ResNet