We present the findings of the Machine Learning Model Attribution Challe...
Recent years have seen a proliferation of research on adversarial machin...
Recent works within machine learning have been tackling inputs of
ever-i...
Yara rules are a ubiquitous tool among cybersecurity practitioners and
a...
A homoglyph (name spoofing) attack is a common technique used by adversa...
This paper describes EMBER: a labeled benchmark dataset for training mac...
Machine learning is a popular approach to signatureless malware detectio...
Various families of malware use domain generation algorithms (DGAs) to
g...
Many malware families utilize domain generation algorithms (DGAs) to
est...