April 30, 2024, 4:11 a.m. | Wenxiang Zhao, Juntao Wu, Zhaoyi Meng

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.18816v1 Announce Type: new
Abstract: Due to the vast array of Android applications, their multifarious functions and intricate behavioral semantics, attackers can adopt various tactics to conceal their genuine attack intentions within legitimate functions. However, numerous feature engineering based methods suffer from a limitation in mining behavioral semantic information, thus impeding the accuracy and efficiency of Android malware detection. Besides, the majority of existing feature engineering based methods are weakly interpretive and fail to furnish researchers with effective and readable …

android android malware applications array arxiv attack attackers can conceal cs.cr cs.se detection engineering feature functions language large large language model malware malware detection mining prompt semantic semantics tactics vast

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Security Engineer

@ BedRock Systems | San Francisco, Boston, DC, Berlin, Munich, Bengaluru

Project Manager - Project Principal Consultant

@ SAP | Istanbul, TR, 34700

Software Security Engineer

@ Ledger | Paris, France