Zobrazeno 1 - 10
of 61
pro vyhledávání: '"BOŠANSKÝ, BRANISLAV"'
Autor:
Bosansky, Branislav, Hospodkova, Lada, Najman, Michal, Rigaki, Maria, Babayeva, Elnaz, Lisy, Viliam
The accuracy of deployed malware-detection classifiers degrades over time due to changes in data distributions and increasing discrepancies between training and testing data. This phenomenon is known as the concept drift. While the concept drift can
Externí odkaz:
http://arxiv.org/abs/2404.09352
Autor:
Tsingenopoulos, Ilias, Cortellazzi, Jacopo, Bošanský, Branislav, Aonzo, Simone, Preuveneers, Davy, Joosen, Wouter, Pierazzi, Fabio, Cavallaro, Lorenzo
ML-based malware detection on dynamic analysis reports is vulnerable to both evasion and spurious correlations. In this work, we investigate a specific ML architecture employed in the pipeline of a widely-known commercial antivirus company, with the
Externí odkaz:
http://arxiv.org/abs/2402.19027
Autor:
Sayed, Md Abu, Anwar, Ahmed H., Kiekintveld, Christopher, Bosansky, Branislav, Kamhoua, Charles
Publikováno v:
International Conference on Decision and Game Theory for Security, pp. 44-63. Cham: Springer International Publishing, 2022
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepr
Externí odkaz:
http://arxiv.org/abs/2307.13107
Autor:
Bosansky, Branislav, Kouba, Dominik, Manhal, Ondrej, Sick, Thorsten, Lisy, Viliam, Kroustek, Jakub, Somol, Petr
There is a limited amount of publicly available data to support research in malware analysis technology. Particularly, there are virtually no publicly available datasets generated from rich sandboxes such as Cuckoo/CAPE. The benefit of using dynamic
Externí odkaz:
http://arxiv.org/abs/2209.03188
Learning from raw data input, thus limiting the need for feature engineering, is a component of many successful applications of machine learning methods in various domains. While many problems naturally translate into a vector representation directly
Externí odkaz:
http://arxiv.org/abs/2208.02694
Stackelberg equilibrium is a solution concept that describes optimal strategies to commit: Player 1 (the leader) first commits to a strategy that is publicly announced, then Player 2 (the follower) plays a best response to the leader's commitment. We
Externí odkaz:
http://arxiv.org/abs/2111.02111
Publikováno v:
In International Journal of Approximate Reasoning December 2024 175
In malware behavioral analysis, the list of accessed and created files very often indicates whether the examined file is malicious or benign. However, malware authors are trying to avoid detection by generating random filenames and/or modifying used
Externí odkaz:
http://arxiv.org/abs/2110.11987
Many security and other real-world situations are dynamic in nature and can be modelled as strictly competitive (or zero-sum) dynamic games. In these domains, agents perform actions to affect the environment and receive observations -- possibly imper
Externí odkaz:
http://arxiv.org/abs/2010.11243
Autor:
Petrova, Olga, Durkota, Karel, Alperovich, Galina, Horak, Karel, Najman, Michal, Bosansky, Branislav, Lisy, Viliam
Anomaly detection is a method for discovering unusual and suspicious behavior. In many real-world scenarios, the examined events can be directly linked to the actions of an adversary, such as attacks on computer networks or frauds in financial operat
Externí odkaz:
http://arxiv.org/abs/2004.10638