Jan. 26, 2024, 2:10 a.m. | Hamid Bostani, Veelasha Moonsamy

cs.CR updates on arXiv.org arxiv.org

Over the last decade, researchers have extensively explored the
vulnerabilities of Android malware detectors to adversarial examples through
the development of evasion attacks; however, the practicality of these attacks
in real-world scenarios remains arguable. The majority of studies have assumed
attackers know the details of the target classifiers used for malware
detection, while in reality, malicious actors have limited access to the target
classifiers. This paper introduces EvadeDroid, a problem-space adversarial
attack designed to effectively evade black-box Android malware detectors …

adversarial android android malware arxiv attack attackers attacks box detection development evasion evasion attacks examples machine machine learning malware malware detection real researchers studies vulnerabilities world

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens