{"id":"https://openalex.org/W4411093959","doi":"https://doi.org/10.1145/3713081.3732928","title":"From Large Language Models to Adversarial Malware: How far are we","display_name":"From Large Language Models to Adversarial Malware: How far are we","publication_year":2025,"publication_date":"2025-06-06","ids":{"openalex":"https://openalex.org/W4411093959","doi":"https://doi.org/10.1145/3713081.3732928"},"language":"en","primary_location":{"id":"doi:10.1145/3713081.3732928","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3713081.3732928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100717593","display_name":"Shuai He","orcid":"https://orcid.org/0000-0003-3541-4599"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuai He","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China","Hubei Key Laboratory of Distributed System Security, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Wuhan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102647607","display_name":"Hao Yan","orcid":"https://orcid.org/0000-0002-5495-9001"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Yan","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101514513","display_name":"Wenke Li","orcid":"https://orcid.org/0000-0002-2172-8709"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenke Li","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112907857","display_name":"Sheng Hong","orcid":"https://orcid.org/0009-0004-5919-0248"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Hong","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101813746","display_name":"Xiaowei Guo","orcid":"https://orcid.org/0000-0001-7239-7471"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaowei Guo","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100764505","display_name":"Xiaofan Liu","orcid":"https://orcid.org/0000-0002-8011-8564"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofan Liu","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038034507","display_name":"Cai Fu","orcid":"https://orcid.org/0000-0003-4536-3537"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cai Fu","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China","Hubei Key Laboratory of Distributed System Security, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Wuhan, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100717593"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17427956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"178","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7982807755470276},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.772491455078125},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7427053451538086},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38729196786880493},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.35655850172042847},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3309835195541382}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7982807755470276},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.772491455078125},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7427053451538086},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38729196786880493},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.35655850172042847},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3309835195541382}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3713081.3732928","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3713081.3732928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2732916693","https://openalex.org/W2973628901","https://openalex.org/W2992252352","https://openalex.org/W3036847733","https://openalex.org/W3090219579","https://openalex.org/W3104141960","https://openalex.org/W3164220323","https://openalex.org/W4210864560","https://openalex.org/W4281385582","https://openalex.org/W4288072399","https://openalex.org/W4394769426"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W3204019825"],"abstract_inverted_index":{"Large":[0],"Language":[1],"Models":[2],"(LLMs)":[3],"have":[4,49],"achieved":[5],"notable":[6],"progress":[7,64],"in":[8,24,53,70,170],"fields":[9],"including":[10],"natural":[11,156],"language":[12,157],"processing,":[13],"cyber":[14],"threat":[15],"detection,":[16,165],"and":[17,59,65,98,105,113,154,174],"automated":[18],"penetration":[19],"testing,":[20],"increasingly":[21],"being":[22],"applied":[23],"practical":[25],"settings.":[26],"However,":[27],"the":[28,63,80,111],"rapid":[29],"advancement":[30],"of":[31,68,83,92,136],"these":[32],"models":[33],"has":[34],"also":[35],"led":[36],"to":[37,44],"their":[38],"potential":[39,66,168],"misuse,":[40],"posing":[41],"new":[42],"challenges":[43],"cyberspace":[45,172],"security.":[46],"Security":[47],"incidents":[48],"already":[50],"been":[51],"reported":[52],"areas":[54],"such":[55],"as":[56],"phishing":[57],"attacks":[58],"disinformation":[60],"campaigns.":[61],"Nevertheless,":[62],"impact":[67],"LLMs":[69],"generating":[71],"adversarial":[72,84,178],"malware":[73,85,127,161,179],"remain":[74],"underexplored.":[75],"This":[76],"study":[77],"systematically":[78],"investigates":[79],"evasion":[81,134],"capability":[82],"generated":[86],"by":[87],"LLMs.":[88],"By":[89],"integrating":[90],"chain":[91],"thought":[93],"into":[94],"a":[95,121],"Markov":[96],"process":[97],"designing":[99],"prompt":[100],"based":[101],"state":[102],"transition":[103],"functions":[104],"reward":[106],"mechanisms,":[107],"this":[108],"research":[109],"evaluates":[110],"effectiveness":[112],"efficiency":[114],"against":[115],"mainstream":[116],"static":[117,164],"detection":[118,175],"methods":[119],"on":[120,143],"dataset":[122],"comprising":[123],"over":[124],"2,000":[125],"real-world":[126],"samples.":[128],"Experimental":[129],"results":[130],"demonstrate":[131],"an":[132],"average":[133],"rate":[135],"89.92%":[137],"across":[138],"12":[139],"commercial":[140],"antivirus":[141],"engines":[142],"VirusTotal.":[144],"The":[145],"findings":[146],"reveal":[147],"that":[148,162],"individuals":[149],"with":[150],"minimal":[151],"technical":[152],"expertise":[153],"basic":[155],"skills":[158],"can":[159],"generate":[160],"evades":[163],"which":[166],"underscores":[167],"vulnerabilities":[169],"current":[171],"defense":[173],"systems":[176],"regarding":[177],"countermeasures.":[180]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
