Search Results for author: Dmitrijs Trizna

Found 5 papers, 3 papers with code

SLIFER: Investigating Performance and Robustness of Malware Detection Pipelines

no code implementations23 May 2024 Andrea Ponte, Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli

As a result of decades of research, Windows malware detection is approached through a plethora of techniques.

Malware Detection

Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation

no code implementations28 Feb 2024 Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli

The living-off-the-land (LOTL) offensive methodologies rely on the perpetration of malicious actions through chains of commands executed by legitimate applications, identifiable exclusively by analysis of system logs.

Data Augmentation

Nebula: Self-Attention for Dynamic Malware Analysis

1 code implementation19 Sep 2023 Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli

Dynamic analysis enables detecting Windows malware by executing programs in a controlled environment, and storing their actions in log reports.

Malware Analysis Malware Detection

Quo Vadis: Hybrid Machine Learning Meta-Model based on Contextual and Behavioral Malware Representations

1 code implementation20 Aug 2022 Dmitrijs Trizna

The detection heuristic in contemporary machine learning Windows malware classifiers is typically based on the static properties of the sample since dynamic analysis through virtualization is challenging for vast quantities of samples.

Malware Analysis

Shell Language Processing: Unix command parsing for Machine Learning

1 code implementation6 Jul 2021 Dmitrijs Trizna

In this article, we present a Shell Language Preprocessing (SLP) library, which implements tokenization and encoding directed at parsing Unix and Linux shell commands.

BIG-bench Machine Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.