Skip to main content

Showing 1–3 of 3 results for author: Aonzo, S

.
  1. arXiv:2402.19027  [pdf, other

    cs.CR cs.AI

    How to Train your Antivirus: RL-based Hardening through the Problem-Space

    Authors: Jacopo Cortellazzi, Ilias Tsingenopoulos, Branislav Bošanský, Simone Aonzo, Davy Preuveneers, Wouter Joosen, Fabio Pierazzi, Lorenzo Cavallaro

    Abstract: ML-based malware detection on dynamic analysis reports is vulnerable to both evasion and spurious correlations. In this work, we investigate a specific ML architecture employed in the pipeline of a widely-known commercial antivirus company, with the goal to harden it against adversarial malware. Adversarial training, the sole defensive technique that can confer empirical robustness, is not applica… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: 20 pages,4 figures

  2. arXiv:2307.14657  [pdf, other

    cs.CR cs.LG

    Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance

    Authors: Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge

    Abstract: Many studies have proposed machine-learning (ML) models for malware detection and classification, reporting an almost-perfect performance. However, they assemble ground-truth in different ways, use diverse static- and dynamic-analysis techniques for feature extraction, and even differ on what they consider a malware family. As a consequence, our community still lacks an understanding of malware cl… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

  3. arXiv:2112.11289  [pdf, other

    cs.CR

    Longitudinal Study of the Prevalence of Malware Evasive Techniques

    Authors: Lorenzo Maffia, Dario Nisi, Platon Kotzias, Giovanni Lagorio, Simone Aonzo, Davide Balzarotti

    Abstract: By their very nature, malware samples employ a variety of techniques to conceal their malicious behavior and hide it from analysis tools. To mitigate the problem, a large number of different evasion techniques have been documented over the years, and PoC implementations have been collected in public frameworks, like the popular Al-Khaser. As malware authors tend to reuse existing approaches, it is… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.