Aug. 15, 2022, 1:20 a.m. | Adeilson Antonio da Silva, Mauricio Pamplona Segundo

cs.CR updates on arXiv.org arxiv.org

We investigate how to modify executable files to deceive malware
classification systems. This work's main contribution is a methodology to
inject bytes across a malware file randomly and use it both as an attack to
decrease classification accuracy but also as a defensive method, augmenting the
data available for training. It respects the operating system file format to
make sure the malware will still execute after our injection and will not
change its behavior. We reproduced five state-of-the-art malware classification …

classification injection malware malware classification

Security Analysis Senior Analyst

@ NTT DATA | Bengaluru, KA, IN

SAP NS2 SIEM Engineering Manager - Herndon (Hybrid)

@ SAP | Herndon, VA, US, 20171

Security Architect - Infrastructure

@ Yorkshire Water | Bradford, GB

Information System Security Officer, Journeyman (Secret)

@ Resource Management Concepts, Inc. | Patuxent River, Maryland, United States

Technology Information Security GRC Senior

@ KPMG India | Gurgaon, Haryana, India

Principal CyberSecurity Engineer

@ DTCC | Dallas, TX, United States