Kshitiz Aryal
YOU?
Author Swipe
View article: A Survey on Adversarial Attacks for Malware Analysis
A Survey on Adversarial Attacks for Malware Analysis Open
Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats. However, minor perturbations or ineffectual byte insertion…
View article: SoK: Leveraging Transformers for Malware Analysis
SoK: Leveraging Transformers for Malware Analysis Open
The introduction of transformers has been an important breakthrough for AI research and application as transformers are the foundation behind Generative AI. A promising application domain for transformers is cybersecurity, in particular th…
View article: Explainability-Informed Targeted Malware Misclassification
Explainability-Informed Targeted Malware Misclassification Open
In recent years, there has been a surge in malware attacks across critical infrastructures, requiring further research and development of appropriate response and remediation strategies in malware detection and classification. Several work…
View article: Explainability Guided Adversarial Evasion Attacks on Malware Detectors
Explainability Guided Adversarial Evasion Attacks on Malware Detectors Open
As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical. In the malware domain, this adversarial sample generatio…
View article: Explainable Deep Learning Models for Dynamic and Online Malware Classification
Explainable Deep Learning Models for Dynamic and Online Malware Classification Open
In recent years, there has been a significant surge in malware attacks, necessitating more advanced preventive measures and remedial strategies. While several successful AI-based malware classification approaches exist categorized into sta…
View article: Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File
Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File Open
Windows malware is predominantly available in cyberspace and is a prime target for deliberate adversarial evasion attacks. Although researchers have investigated the adversarial malware attack problem, a multitude of important questions re…
View article: From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy Open
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it…
View article: Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector
Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector Open
With the increase in machine learning (ML) applications in different domains, incentives for deceiving these models have reached more than ever. As data is the core backbone of ML algorithms, attackers shifted their interest toward polluti…
View article: From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy Open
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models like ChatGPT and Google Bard continue to foster their complexity and capability, it…
View article: A Survey on Adversarial Attacks for Malware Analysis
A Survey on Adversarial Attacks for Malware Analysis Open
Machine learning has witnessed tremendous growth in its adoption and advancement in the last decade. The evolution of machine learning from traditional algorithms to modern deep learning architectures has shaped the way today's technology …