ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2003.13526
  4. Cited By
Functionality-preserving Black-box Optimization of Adversarial Windows
  Malware
v1v2v3v4 (latest)

Functionality-preserving Black-box Optimization of Adversarial Windows Malware

IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2020
30 March 2020
Christian Scano
Battista Biggio
Giovanni Lagorio
Fabio Roli
A. Armando
    AAML
ArXiv (abs)PDFHTML

Papers citing "Functionality-preserving Black-box Optimization of Adversarial Windows Malware"

50 / 56 papers shown
One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises
One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises
Biagio Montaruli
Luca Compagna
Serena Elisa Ponta
Davide Balzarotti
134
0
0
03 Dec 2025
Efficient Adversarial Malware Defense via Trust-Based Raw Override and Confidence-Adaptive Bit-Depth Reduction
Efficient Adversarial Malware Defense via Trust-Based Raw Override and Confidence-Adaptive Bit-Depth Reduction
Ayush Chaudhary
Sisir Doppalpudi
AAML
193
0
0
16 Nov 2025
Demystifying the Role of Rule-based Detection in AI Systems for Windows Malware Detection
Demystifying the Role of Rule-based Detection in AI Systems for Windows Malware Detection
Andrea Ponte
Luca Demetrio
Luca Oneto
Ivan Tesfai Ogbu
Battista Biggio
Fabio Roli
AAML
190
0
0
13 Aug 2025
Certifiably robust malware detectors by design
Certifiably robust malware detectors by designIFIP International Information Security Conference (IFIP SEC), 2025
Pierre-Francois Gimenez
S. Sivaprasad
Mario Fritz
AAML
172
0
0
10 Aug 2025
Empirical Quantification of Spurious Correlations in Malware Detection
Empirical Quantification of Spurious Correlations in Malware Detection
Bianca Perasso
Ludovico Lozza
Andrea Ponte
Luca Demetrio
Luca Oneto
Fabio Roli
309
0
0
11 Jun 2025
On the Security Risks of ML-based Malware Detection Systems: A Survey
On the Security Risks of ML-based Malware Detection Systems: A Survey
Ping He
Yuhao Mao
Changjiang Li
Lorenzo Cavallaro
Ting Wang
Shouling Ji
451
3
0
16 May 2025
SLIFER: Investigating Performance and Robustness of Malware Detection
  Pipelines
SLIFER: Investigating Performance and Robustness of Malware Detection PipelinesComputers & security (Comput. Secur.), 2024
Andrea Ponte
Dmitrijs Trizna
Christian Scano
Battista Biggio
Ivan Tesfai Ogbu
Fabio Roli
301
9
0
23 May 2024
A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection
Marco Rando
Christian Scano
Lorenzo Rosasco
Fabio Roli
AAML
347
3
0
23 May 2024
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples
Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmplesComputers & security (Comput. Secur.), 2024
M. Kozák
Christian Scano
Dmitrijs Trizna
Fabio Roli
AAML
394
3
0
04 May 2024
Certified Adversarial Robustness of Machine Learning-based Malware
  Detectors via (De)Randomized Smoothing
Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing
Daniel Gibert
Christian Scano
Giulio Zizzo
Quan Le
Jordi Planes
Battista Biggio
AAML
298
5
0
01 May 2024
Machine Learning for Windows Malware Detection and Classification:
  Methods, Challenges and Ongoing Research
Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research
Daniel Gibert
AAML
209
7
0
29 Apr 2024
Multi-Fidelity Bayesian Optimization With Across-Task Transferable Max-Value Entropy Search
Multi-Fidelity Bayesian Optimization With Across-Task Transferable Max-Value Entropy SearchIEEE Transactions on Signal Processing (IEEE TSP), 2024
Yunchuan Zhang
Sangwoo Park
Osvaldo Simeone
587
10
0
14 Mar 2024
Intra-Section Code Cave Injection for Adversarial Evasion Attacks on
  Windows PE Malware File
Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File
Kshitiz Aryal
Maanak Gupta
Mahmoud Abdelsalam
Moustafa Saleh
AAML
226
10
0
11 Mar 2024
How to Train your Antivirus: RL-based Hardening through the
  Problem-Space
How to Train your Antivirus: RL-based Hardening through the Problem-Space
Jacopo Cortellazzi
Ilias Tsingenopoulos
B. Bosanský
Simone Aonzo
Davy Preuveneers
Wouter Joosen
Fabio Pierazzi
Lorenzo Cavallaro
272
7
0
29 Feb 2024
A Robust Defense against Adversarial Attacks on Deep Learning-based
  Malware Detectors via (De)Randomized Smoothing
A Robust Defense against Adversarial Attacks on Deep Learning-based Malware Detectors via (De)Randomized Smoothing
Daniel Gibert
Giulio Zizzo
Quan Le
Jordi Planes
AAML
269
8
0
23 Feb 2024
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt
  Algorithm To Generate Webshell Escape Samples
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples
Mingrui Ma
Lansheng Han
Chunjie Zhou
SILMAAML
276
3
0
12 Feb 2024
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep
  Reinforcement Learning Approach
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach
Brian Etter
Junjie Hu
Mohammedreza Ebrahimi
Weifeng Li
Xin Li
Hsinchun Chen
287
3
0
04 Feb 2024
A Malware Classification Survey on Adversarial Attacks and Defences
A Malware Classification Survey on Adversarial Attacks and Defences
Mahesh Ponnuru
Likhitha Amasala
Tanu Sree Bhimavarapu
Guna Chaitanya Garikipati
AAML
171
6
0
15 Dec 2023
Burning the Adversarial Bridges: Robust Windows Malware Detection
  Against Binary-level Mutations
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations
Ahmed A. Abusnaina
Yizhen Wang
Sunpreet S. Arora
Ke Wang
Mihai Christodorescu
David A. Mohaisen
AAML
304
7
0
05 Oct 2023
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on
  Machine-Learning Phishing Webpage Detectors
Raze to the Ground: Query-Efficient Adversarial HTML Attacks on Machine-Learning Phishing Webpage Detectors
Giuseppe Floris
Christian Scano
Maura Pintor
Luca Demetrio
Davide Balzarotti
Battista Biggio
AAML
264
12
0
04 Oct 2023
The Power of MEME: Adversarial Malware Creation with Model-Based
  Reinforcement Learning
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement LearningEuropean Symposium on Research in Computer Security (ESORICS), 2023
M. Rigaki
Sebastian Garcia
AAML
197
8
0
31 Aug 2023
A Comparison of Adversarial Learning Techniques for Malware Detection
A Comparison of Adversarial Learning Techniques for Malware DetectionJournal of Computer Virology and Hacking Techniques (JCVHT), 2023
Pavla Louthánová
M. Kozák
M. Jureček
Mark Stamp
AAML
258
11
0
19 Aug 2023
Towards a Practical Defense against Adversarial Attacks on Deep
  Learning-based Malware Detectors via Randomized Smoothing
Towards a Practical Defense against Adversarial Attacks on Deep Learning-based Malware Detectors via Randomized Smoothing
Daniel Gibert
Giulio Zizzo
Quan Le
AAML
174
6
0
17 Aug 2023
ATWM: Defense against adversarial malware based on adversarial training
ATWM: Defense against adversarial malware based on adversarial training
Kunkun Li
Fan Zhang
Wei Guo
AAML
241
2
0
11 Jul 2023
Creating Valid Adversarial Examples of Malware
Creating Valid Adversarial Examples of MalwareJournal of Computer Virology and Hacking Techniques (JCVHT), 2023
M. Kozák
M. Jureček
Mark Stamp
Fabio Di Troia
AAML
215
20
0
23 Jun 2023
Query-Free Evasion Attacks Against Machine Learning-Based Malware
  Detectors with Generative Adversarial Networks
Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks
Daniel Gibert
Jordi Planes
Quan Le
Giulio Zizzo
AAML
210
10
0
16 Jun 2023
Combining Generators of Adversarial Malware Examples to Increase Evasion
  Rate
Combining Generators of Adversarial Malware Examples to Increase Evasion RateInternational Conference on Security and Cryptography (SECRYPT), 2023
M. Kozák
M. Jureček
AAML
173
2
0
14 Apr 2023
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified
  Robustness
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified RobustnessInternational Conference on Learning Representations (ICLR), 2023
Shoumik Saha
Wenxiao Wang
Yigitcan Kaya
Soheil Feizi
Tudor Dumitras
AAML
209
5
0
20 Mar 2023
PAD: Towards Principled Adversarial Malware Detection Against Evasion
  Attacks
PAD: Towards Principled Adversarial Malware Detection Against Evasion AttacksIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Deqiang Li
Shicheng Cui
Yun Li
Jia Xu
Fu Xiao
Shouhuai Xu
AAML
467
32
0
22 Feb 2023
Effectiveness of Moving Target Defenses for Adversarial Attacks in
  ML-based Malware Detection
Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-based Malware DetectionIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2023
Aqib Rashid
Jose Such
AAML
201
5
0
01 Feb 2023
RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers
  via Randomized Deletion
RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized DeletionNeural Information Processing Systems (NeurIPS), 2023
Zhuoqun Huang
Neil G. Marchant
Keane Lucas
Lujo Bauer
O. Ohrimenko
Benjamin I. P. Rubinstein
AAML
488
20
0
31 Jan 2023
Feature-Space Bayesian Adversarial Learning Improved Malware Detector
  Robustness
Feature-Space Bayesian Adversarial Learning Improved Malware Detector RobustnessAAAI Conference on Artificial Intelligence (AAAI), 2023
Bao Gia Doan
Shuiqiao Yang
Paul Montague
O. Vel
Tamas Abraham
S. Çamtepe
S. Kanhere
Ehsan Abbasnejad
Damith C. Ranasinghe
OODAAML
267
10
0
30 Jan 2023
Efficient Malware Analysis Using Metric Embeddings
Efficient Malware Analysis Using Metric Embeddings
Ethan M. Rudd
David B. Krisiloff
Scott E. Coull
Daniel Olszewski
Edward Raff
James Holt
AAML
282
16
0
05 Dec 2022
Multi-view Representation Learning from Malware to Defend Against
  Adversarial Variants
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants
Junjie Hu
Mohammadreza Ebrahimi
Weifeng Li
Xin Li
Hsinchun Chen
AAML
167
3
0
25 Oct 2022
The Space of Adversarial Strategies
The Space of Adversarial Strategies
Ryan Sheatsley
Blaine Hoak
Eric Pauley
Patrick McDaniel
AAML
292
6
0
09 Sep 2022
Instance Attack:An Explanation-based Vulnerability Analysis Framework
  Against DNNs for Malware Detection
Instance Attack:An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware DetectionPeerJ Computer Science (PeerJ CS), 2022
Ruijin Sun
Shize Guo
Jinhong Guo
Changyou Xing
Luming Yang
Xi Guo
Zhisong Pan
AAML
340
2
0
06 Sep 2022
Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and
  Behavioral Malware Representations
Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations
Dmitrijs Trizna
158
18
0
20 Aug 2022
Practical Attacks on Machine Learning: A Case Study on Adversarial
  Windows Malware
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows MalwareIEEE Security and Privacy (IEEE S&P), 2022
Christian Scano
Battista Biggio
Fabio Roli
AAML
187
8
0
12 Jul 2022
Fusing Feature Engineering and Deep Learning: A Case Study for Malware
  Classification
Fusing Feature Engineering and Deep Learning: A Case Study for Malware ClassificationExpert systems with applications (ESWA), 2022
Daniel Gibert
Carles Mateu
Jordi Planes
Quan Le
AAML
257
66
0
12 Jun 2022
Stealing and Evading Malware Classifiers and Antivirus at Low False
  Positive Conditions
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive ConditionsComputers & security (Comput. Secur.), 2022
M. Rigaki
Sebastian Garcia
AAML
341
12
0
13 Apr 2022
MERLIN -- Malware Evasion with Reinforcement LearnINg
MERLIN -- Malware Evasion with Reinforcement LearnINg
Tony Quertier
Benjamin Marais
Stephane Morucci
Bertrand Fournel
AAML
378
22
0
24 Mar 2022
StratDef: Strategic Defense Against Adversarial Attacks in ML-based
  Malware Detection
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware DetectionComputers & security (Comput. Secur.), 2022
Aqib Rashid
Jose Such
AAML
600
12
0
15 Feb 2022
Adversarial Attacks against Windows PE Malware Detection: A Survey of
  the State-of-the-Art
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-ArtComputers & security (CS), 2021
Xiang Ling
Lingfei Wu
Jiangyu Zhang
Zhenqing Qu
Wei Deng
...
Chunming Wu
S. Ji
Tianyue Luo
Jingzheng Wu
Yanjun Wu
AAML
653
106
0
23 Dec 2021
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A
  Causal Language Model Approach
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach
Junjie Hu
Mohammadreza Ebrahimi
Hsinchun Chen
AAML
194
13
0
03 Dec 2021
MALIGN: Explainable Static Raw-byte Based Malware Family Classification
  using Sequence Alignment
MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence AlignmentComputers & security (CS), 2021
Shoumik Saha
Sadia Afroz
A. Rahman
455
10
0
28 Nov 2021
Statically Detecting Adversarial Malware through Randomised Chaining
Statically Detecting Adversarial Malware through Randomised ChainingAustralasian Computer Science Week (ACSW), 2021
Matthew Crawford
Wei Wang
Ruoxi Sun
Minhui Xue
AAML
174
1
0
28 Nov 2021
Dissecting Malware in the Wild
Dissecting Malware in the WildAustralasian Computer Science Week (ACSW), 2021
H. Spencer
Wei Wang
Ruoxi Sun
Minhui Xue
180
2
0
28 Nov 2021
A Comparison of State-of-the-Art Techniques for Generating Adversarial
  Malware Binaries
A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries
P. Dasgupta
Zachary Osman
AAML
160
2
0
22 Nov 2021
Mate! Are You Really Aware? An Explainability-Guided Testing Framework
  for Robustness of Malware Detectors
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Ruoxi Sun
Minhui Xue
Gareth Tyson
Tian Dong
Shaofeng Li
Shuo Wang
Haojin Zhu
S. Çamtepe
Surya Nepal
AAML
327
20
0
19 Nov 2021
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box
  Android Malware Detection
EvadeDroid: A Practical Evasion Attack on Machine Learning for Black-box Android Malware Detection
Hamid Bostani
Veelasha Moonsamy
AAML
520
77
0
07 Oct 2021
12
Next
Page 1 of 2