{"id":"https://openalex.org/W4406458416","doi":"https://doi.org/10.1109/bigdata62323.2024.10826102","title":"Not All Malware are Born Equally: An Empirical Analysis of Adversarial Evasion Attacks in Relation to Malware Types and PE Files Structure","display_name":"Not All Malware are Born Equally: An Empirical Analysis of Adversarial Evasion Attacks in Relation to Malware Types and PE Files Structure","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406458416","doi":"https://doi.org/10.1109/bigdata62323.2024.10826102"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10826102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10826102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024735928","display_name":"Praveen V. Mummaneni","orcid":"https://orcid.org/0000-0001-5501-7262"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Prabhath Mummaneni","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Computer Science,Greensboro,North Carolina,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Computer Science,Greensboro,North Carolina,USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005398538","display_name":"Kshitiz Aryal","orcid":"https://orcid.org/0000-0001-8000-1086"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kshitiz Aryal","raw_affiliation_strings":["Tennessee Tech University,Department of Computer Science,Cookeville,Tennessee,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Computer Science,Cookeville,Tennessee,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064628952","display_name":"Mahmoud Abdelsalam","orcid":"https://orcid.org/0000-0001-5627-5239"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud Abdelsalam","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Department of Computer Science,Greensboro,North Carolina,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Department of Computer Science,Greensboro,North Carolina,USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047952246","display_name":"Maanak Gupta","orcid":"https://orcid.org/0000-0001-9189-2478"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maanak Gupta","raw_affiliation_strings":["Tennessee Tech University,Department of Computer Science,Cookeville,Tennessee,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech University,Department of Computer Science,Cookeville,Tennessee,USA","institution_ids":["https://openalex.org/I63920570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024735928"],"corresponding_institution_ids":["https://openalex.org/I35777872"],"apc_list":null,"apc_paid":null,"fwci":0.375,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62217582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"5620","last_page":"5629"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8611958026885986},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.7806360721588135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7390569448471069},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.6867527961730957},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6569764018058777},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5146421194076538},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35407790541648865},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32331520318984985}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8611958026885986},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.7806360721588135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7390569448471069},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.6867527961730957},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6569764018058777},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5146421194076538},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35407790541648865},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32331520318984985},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10826102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10826102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2108598243","https://openalex.org/W2586608967","https://openalex.org/W2609484576","https://openalex.org/W2738219410","https://openalex.org/W2799420851","https://openalex.org/W2931858311","https://openalex.org/W2963165251","https://openalex.org/W2963542245","https://openalex.org/W2973628901","https://openalex.org/W2991150929","https://openalex.org/W3003302059","https://openalex.org/W3005994722","https://openalex.org/W3024566548","https://openalex.org/W3109078334","https://openalex.org/W3113774281","https://openalex.org/W3149084432","https://openalex.org/W3161794458","https://openalex.org/W3214547528","https://openalex.org/W4246193833","https://openalex.org/W4293846201","https://openalex.org/W4377864719","https://openalex.org/W4392182340","https://openalex.org/W6640425456","https://openalex.org/W6739868092","https://openalex.org/W6745899033","https://openalex.org/W6751070894","https://openalex.org/W6852931666","https://openalex.org/W6861804897"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W2783112941","https://openalex.org/W2526398307","https://openalex.org/W2470029541","https://openalex.org/W4387065217","https://openalex.org/W4368275542","https://openalex.org/W2470502009"],"abstract_inverted_index":{"Malware":[0],"white-box":[1,37],"evasion":[2,38,60,90,140,151,175,206],"attack":[3],"is":[4,68],"a":[5,21,25,30,63,69,97],"serious":[6],"threat":[7],"to":[8,28,45,142,150],"machine":[9],"learning-based":[10],"malware":[11,22,47,76,84,105,137,148,160,184,212,220],"classification":[12],"models,":[13],"where":[14],"an":[15],"attacker":[16],"carefully":[17],"inserts":[18],"perturbations":[19],"into":[20,73],"executable":[23],"at":[24],"test":[26],"time":[27],"evade":[29],"target":[31,64],"model.":[32,65],"Previous":[33],"research":[34],"introduced":[35],"different":[36,145,190,215],"attacks,":[39,44],"namely":[40],"padding":[41],"and":[42,50,58,79,87,107,139,162,194,214],"slack":[43,113,122,165],"craft":[46],"adversarial":[48,83,178,183,209],"samples":[49,185],"evaluated":[51],"them":[52],"based":[53],"on":[54],"the":[55,75,82,104,108,121,126,134,156,163,174],"perturbation":[56],"size":[57],"their":[59,88],"rate":[61,141],"against":[62],"However,":[66],"there":[67],"lack":[70],"of":[71,128,147,205,208,218],"insights":[72],"how":[74,120,144,169],"file":[77],"structure":[78,106],"type":[80,138,161],"affect":[81],"sample":[85],"generation":[86],"respective":[89],"rate.":[91],"In":[92,180],"this":[93],"work,":[94],"we":[95,154],"provide":[96],"comprehensive":[98],"empirical":[99],"analysis":[100,111,201],"by":[101],"factoring":[102],"in":[103,116],"type.":[109],"Our":[110],"quantifies":[112],"space":[114,123,166],"availability":[115],"various":[117],"sections,":[118],"exploring":[119],"can":[124],"influence":[125,173],"robustness":[127],"detection":[129],"techniques.":[130],"We":[131],"further":[132],"assess":[133],"relationship":[135],"between":[136,158],"understand":[143],"types":[146,213],"respond":[149],"attacks.":[152,179],"Additionally,":[153],"explore":[155],"connection":[157],"each":[159],"corresponding":[164],"availability,":[167],"analyzing":[168],"these":[170],"structural":[171,216],"factors":[172],"rates":[176],"during":[177],"our":[181,203],"experiments,":[182],"were":[186],"generated":[187],"using":[188],"two":[189],"algorithms:":[191],"gradient":[192,196],"descent":[193],"iterative":[195],"sign":[197],"method.":[198],"This":[199],"detailed":[200],"enhances":[202],"understanding":[204],"dynamics":[207],"attacks":[210],"across":[211],"characteristics":[217],"binary":[219],"files.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
